Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Security Tools

Welcome to the Security Tools topic!

Collaborate, contribute, consume and create knowledge around security tools used for vulneratiblity management (Nessus) and pen testing, as well as security linux distributions (Backtrack), and other security tools.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
662 Members
2 Online
8163 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 32 total

Must be a Topic member to contribute
View All »
Based on your work experience what are the best tools/softwarein each section?AuditEnterprise Security ManagementIT ForensicsPenetration Testing. VulnerabilityAssessment. Risk Assessmentencryption toolsRisk ManagementSecurity Event Managementthe recommend...
Elsayed | 7/17/2017 6:36:57 PM | COMMENTS(14)
Hi All I just came across this scanner for IoT. I would like to know if anyone had made use of RIoT and how was the experience Thanks
DK19 | 1/26/2017 8:37:02 PM | COMMENTS(0)
This is one tool I've just recently discovered. This tool is very good at scanning IPv4/IPv6 networks and finding devices with accessible file shares. When it finds a file share, it shows the various groups that can read or write to the file share. Eve...
Gary055 | 1/25/2017 7:11:55 PM | COMMENTS(1)
Yes indeed. Kali enters into the LiveCD security distro arena. You may call it a successor of BackTrack, a branch or just a plain full distro, Kali developers claim it is a new engine under the hood. In fact, lost of new things:
ElliottB | 1/24/2017 7:33:45 PM | COMMENTS(5)
Can someone guide me on what Security tools (open source, freeware, commercial) that someone has already used and found useful and would best help me in security code review for Java and Python source code. In case security tools are not much help, how mu...
SKA | 8/23/2016 9:16:37 AM | COMMENTS(4)
Nessus is a very dynamic tool, always evolving. How are you using it: vulnerability management, running scheduled scans, asset management, identifying PII data, to comply with PCI requirements, etc.? If you came up with a creative way to use it during...
ElliottB | 8/23/2016 1:11:17 AM | COMMENTS(4)

Documents & Publications: 38 total

Must be a Topic member to contribute
View All »
Posted by ISACA 561 days ago
Posted by ISACA 607 days ago
Posted by ISACA 727 days ago
Posted by ISACA 897 days ago

Events & Online Learning: 9 total

9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 44 total

Volume 4, 2017
by Ed Moyle
From email to calendaring to business applications, employees are, quite literally, doing business from any device, any time of the day or night, from anywhere and everywhere on the planet.
Volume 3, 2017
by Sivarama Subramanian, CISA, and Balaji Swaminathan M., CISA, CISSP
During the Internet of Things (IoT) Village held at the DEF CON security conference in August 2016, 47 new vulnerabilities affecting 23 IoT devices from 21 manufacturers were disclosed.
Volume 3, 2017
by Steven J. Ross, CISA, CISSP, MBCP
At each stage in the evolution of information security, there has been a problem—access control, viruses, hackers, data leakage, to name a few—that has seemed insuperable.
Volume 3, 2017
by Danelle Au
Asymmetric warfare is “the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent’s strengths while exploiting his weaknesses.”
Volume 2, 2017
by Ed Moyle
To understand how the business side of any organization intersects with technology, ask an internal auditor. This might sound counterintuitive at first, but think about what auditors need to know to do their job...
Volume 2, 2017
by Trevor J. Dildy, CCNA
Today’s enterprises have solutions in place to help with the detection and management of their information systems vulnerabilities, especially as it relates to system software and firmware.

Wikis: 2 total

Blog Posts: 5 total

Must be a Topic member to view blog posts
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
13 Nov 2014
Posted By : masarker | 4 comments
Follow @arthurhuamanic Después de una larga  caminata rumbo a mi piso, En el quiosco de la esquina me percate de una revista que me llamo mucho la atención era "Linux-Magazine" y de ahi empezaré a detallar un artículo de Michael Messner en la cual nos dem...
Posted By : ArthurHuamani | 0 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments
(By: William Darío Ávila Díaz, PhD) During the National Forum on National Security and Defence held on August 30, 2011 in Barranquilla, Teatro José Consuegra Higgins, the head of the Joint Chiefs, General Luis Felipe Paredes, spoke about the advances in ...
Posted By : William733 | 0 comments