Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Security Tools

Welcome to the Security Tools topic!

Collaborate, contribute, consume and create knowledge around security tools used for vulneratiblity management (Nessus) and pen testing, as well as security linux distributions (Backtrack), and other security tools.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
719 Members
0 Online
8748 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 40 total

Must be a Topic member to contribute
View All »
Can you trust Gartner's 'Magic Quadrant' or other analysts' reports, when security testing tools are concerned?
Dragan Pleskonjic | 7/13/2018 11:32:59 PM | COMMENTS(1)
Hello Guys I am searching for an email encryption service. In the scenario emails is hosted by a 3rd party and do not support encryption.The idea is to have an in house email server in the future but until then i am searching for a encryption solution ...
Frederico077 | 3/30/2018 12:50:35 AM | COMMENTS(1)
Does anyone have any experience with it, good or bad? We're about to do a proof of concept. The screenshots make it look more like a computer game than a serious security tool, but I don't want to be too prejudiced!
Andrew407 | 1/29/2018 9:13:40 AM | COMMENTS(1)
In 23 yrs as an IS Auditor I have done many technical tasks. In ISACA and other literature, I see NMAP listed as a free tool for network discovery/port scanning. I need to do an internal Network Administration and Security audit. I am hoping if you have u...
Chris A. Ward | 1/19/2018 10:10:40 AM | COMMENTS(3)
Does anyone know or have used any freeware scanning tool to audit the health of a website they can recommend? Thanks.
Senh | 1/5/2018 1:09:49 PM | COMMENTS(6)
Whose reports do you believe most in regard to security software and tools: Forrester, Gartner, NSS Labs or someone else?
Dragan Pleskonjic | 11/30/2017 1:09:05 PM | COMMENTS(2)

Documents & Publications: 35 total

Must be a Topic member to contribute
View All »
Posted by ISACA 891 days ago
Posted by ISACA 936 days ago
Posted by ISACA 1057 days ago
Posted by ISACA 1227 days ago

Events & Online Learning: 1 total

Journal Articles: 56 total

Volume 4, 2018
by Shourjo Chatterjee, CIA
Supreme Audit Institutions (SAIs) refer to the national agencies entrusted with ensuring accountability in the functioning of national governments through external audit.
Volume 4, 2018
by Robin Lyons, CISA, CIA
There are two phases of the audit process where IS auditors can leverage tools to make their work align to and support the organization’s strategic objectives.
Volume 4, 2018
by Ramón Serres, CGEIT, CISM, CSX Fundamentals, CCSK, CISSP
Managing cybersecurity or, more specifically, managing cybersecurity risk, is much more than just technology and, in most cases, has nothing to do with having the money to afford state-of-the-art technology.
Volume 4, 2018
by Dave Brunswick
Companies facing the EU’s looming General Data Protection Regulation (GDPR) compliance mandate could benefit from a modernized managed file transfer (MFT) solution.
Volume 3, 2018
by Aleksandr Kuznetcov, CISM
A SOC is a set of staff, processes, technologies and facilities that is primarily focused on identification (detection) and response to cybersecurity incidents that arise as a result of cybersecurity threat realizations.
Volume 3, 2018
by Ed Moyle
Every year, ISACA conducts its annual Global State of Cybersecurity research. The second part of the survey asks about security practices in the field: what is working and what is not.

Wikis: 2 total

Blog Posts: 8 total

Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 5 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
13 Nov 2014
Posted By : masarker | 4 comments
Follow @arthurhuamanic Después de una larga  caminata rumbo a mi piso, En el quiosco de la esquina me percate de una revista que me llamo mucho la atención era "Linux-Magazine" y de ahi empezaré a detallar un artículo de Michael Messner en la cual nos dem...
Posted By : ArthurHuamani | 0 comments