Richard Girling

best cybersecurity courses in 2022

What are the Best CyberSecurity Certifications in 2022? (List of the Top 10)

It’s that time of the year again. Here at ISCN, we bring you an objective list of the top 10 best cybersecurity courses in 2022! This comes from us asking our 100,000-strong ISCN LinkedIn group of cyber security professionals to rank their favourite cyber security courses. Read on to see the results below. NOTE: We …

What are the Best CyberSecurity Certifications in 2022? (List of the Top 10) Read More »

cissp vs cism - what is the difference header

CISM vs CISSP – What is the difference?

There are many cyber security certifications, but two of the most recognized are the CISSP (Certified Information Systems Security Professional) and CISM (Certified Information Security Manager). What most people want to know, however, is “which one is better?” In this blog post, we will answer that, along with other questions like “which one costs more?”, …

CISM vs CISSP – What is the difference? Read More »

Stuck at home? Level up with online cyber security certifications

Stuck at home during the lockdown? Use this time to ‘Level Up’ with our top 3 online cyber security certifications

With ‘half of humanity under lockdown‘, it is likely that you are reading this from your home, or wherever it is that you are isolating yourself. This is an unprecedented and hugely distressing time for many of us, especially for those of us who have lost any friends or family as a result of COVID-19. For …

Stuck at home during the lockdown? Use this time to ‘Level Up’ with our top 3 online cyber security certifications Read More »

5G cyber security

Enough of the politics. Technologically speaking, should Western governments permit Huawei’s involvement in 5G networks?

For months, the mainstream media has been reporting about the supposed security threat posted by Huawei’s involvement in 5G networks. However, these news reports often gloss over the technical side of things. They talk about ‘backdoors’ and ‘security risks’, but at no point do they actually explain how Huawei would ‘steal’ information, or how, technologically …

Enough of the politics. Technologically speaking, should Western governments permit Huawei’s involvement in 5G networks? Read More »

The 5 biggest Cyber Security stories of 2019

2019, like every other year in recent times, has been rammed full of cyber security attacks. For most people, these are scary times. However, if there is a silver-lining to this cloud, then it’s for cyber security professionals. The one positive from all of these attacks is that cyber security specialists are needed. Here’s a …

The 5 biggest Cyber Security stories of 2019 Read More »

Quantum Computing

Quantum computing and the threat to to information security

Introduction – what is quantum computing? This has been defined as technology that: “makes direct use of distinctively quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data.” (Source: https://www.sciencedaily.com/terms/quantum_computer.htm) How does quantum computing work? In order to understand quantum computers, it helps to first understand ‘traditional’ computers. The computer or phone …

Quantum computing and the threat to to information security Read More »

The Top 5 Cyber Security News Stories this Month (March, 2019)

This post aims to give you a quick update about the top 5 cyber security news stories which have happened in March, 2019. 1. The Facebook DNS attack Anyone who still uses Facebook will know that the service (for many users, but not all) was temporarily down for several hours earlier this month. This was …

The Top 5 Cyber Security News Stories this Month (March, 2019) Read More »