<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is cybersecurity a collaboration issue? in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Is-cybersecurity-a-collaboration-issue/m-p/45513#M5468</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is cybersecurity a collaborative issue?&amp;nbsp; After the Colonial pipeline issue, suddenly Zero Trust becomes a mandate along with encryption - but it is not a magic bullet, it is a journey.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.infosecurity-magazine.com/news/biden-executive-order-zero-trust/" target="_blank"&gt;https://www.infosecurity-magazine.com/news/biden-executive-order-zero-trust/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://edition.cnn.com/videos/business/2021/05/11/ibm-ceo-cybersecurity.cnnbusiness/video/playlists/business-cybersecurity/" target="_blank"&gt;https://edition.cnn.com/videos/business/2021/05/11/ibm-ceo-cybersecurity.cnnbusiness/video/playlists/business-cybersecurity/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:53:25 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2023-10-09T09:53:25Z</dc:date>
    <item>
      <title>Is cybersecurity a collaboration issue?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-cybersecurity-a-collaboration-issue/m-p/45513#M5468</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is cybersecurity a collaborative issue?&amp;nbsp; After the Colonial pipeline issue, suddenly Zero Trust becomes a mandate along with encryption - but it is not a magic bullet, it is a journey.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.infosecurity-magazine.com/news/biden-executive-order-zero-trust/" target="_blank"&gt;https://www.infosecurity-magazine.com/news/biden-executive-order-zero-trust/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://edition.cnn.com/videos/business/2021/05/11/ibm-ceo-cybersecurity.cnnbusiness/video/playlists/business-cybersecurity/" target="_blank"&gt;https://edition.cnn.com/videos/business/2021/05/11/ibm-ceo-cybersecurity.cnnbusiness/video/playlists/business-cybersecurity/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:53:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-cybersecurity-a-collaboration-issue/m-p/45513#M5468</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: Is cybersecurity a collaboration issue?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-cybersecurity-a-collaboration-issue/m-p/45519#M5469</link>
      <description>&lt;P&gt;Yes it is a collaboration issue. I have seen too many places where IT and security do not get along.&amp;nbsp; If you can work the magic and achieve collaboration then you are doing well and doing the right thing. I have always tried to show how, as an INFOSEC professional, that we can work together as a team and achieve a better security posture than before and how my efforts are to help them be successful and not hinder them from moving forward.&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 16:29:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-cybersecurity-a-collaboration-issue/m-p/45519#M5469</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2021-05-17T16:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: Is cybersecurity a collaboration issue?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-cybersecurity-a-collaboration-issue/m-p/45520#M5470</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Caute_Cautim&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Although I also believe cybersecurity is a collaboration effort, most of these breaches can be avoid with basic cybersecurity hygiene. In order to achieve this, INFOSEC professionals should have the ability to enforce policies from a top-down approach. Policies in place verifying business-approve controls will provide enough hygiene and shift the focus to more advanced and persistent threads.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 16:46:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-cybersecurity-a-collaboration-issue/m-p/45520#M5470</guid>
      <dc:creator>flendeborg</dc:creator>
      <dc:date>2021-05-17T16:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: Is cybersecurity a collaboration issue?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-cybersecurity-a-collaboration-issue/m-p/45577#M5473</link>
      <description>&lt;P&gt;I am learning JavaScript. I want to learn front, then proceed to back end web development. What path should I follow to become a cyber security expert?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;A href="https://kabosucoin.net/" target="_blank" rel="noopener"&gt;Kabosu Coin Price&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 22 May 2021 08:04:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-cybersecurity-a-collaboration-issue/m-p/45577#M5473</guid>
      <dc:creator>Deshaun</dc:creator>
      <dc:date>2021-05-22T08:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: Is cybersecurity a collaboration issue?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-cybersecurity-a-collaboration-issue/m-p/45644#M5477</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/56188331"&gt;@Deshaun&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thank you for your question.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am interested in why your post had a link to (&lt;A href="https://kabosucoin.net/" target="_blank" rel="noopener"&gt;kabosucoin.net/)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Was it deliberate or did it follow you when you typed in your question?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well, if you are interested in learning Javascript and web application languages, you should know what their weaknesses are, their strengths and what is good practice?&amp;nbsp; So I would personally look towards becoming an ethical or Certified Ethical Hacker or CEH.&amp;nbsp; This gives you the determination to know how it is supposed to work, and then how to break it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just by googling there is plenty of information on the strengths and weaknesses of Javascript&amp;amp;colon;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="co8aDb XcVN5d"&gt;&lt;STRONG&gt;Disadvantages of JavaScript&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV class="RqBzHd"&gt;&lt;UL class="i8Z77e"&gt;&lt;LI&gt;Client-side Security. Since the &lt;STRONG&gt;JavaScript&lt;/STRONG&gt; code is viewable to the user, others may use it for malicious purposes. ...&lt;/LI&gt;&lt;LI&gt;Browser Support. The browser interprets &lt;STRONG&gt;JavaScript&lt;/STRONG&gt; differently in different browsers. ...&lt;/LI&gt;&lt;LI&gt;Lack of Debugging Facility. ...&lt;/LI&gt;&lt;LI&gt;Single Inheritance. ...&lt;/LI&gt;&lt;LI&gt;Sluggish Bitwise Function. ...&lt;/LI&gt;&lt;LI&gt;Rendering Stopped.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;There are plenty of books either online or guides on the subject, everyone has to start somewhere, so if you are really interested follow your nose, and be inquisitive and go hunting such information down.&amp;nbsp; Or seek out a mentor to assist you and guide you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 25 May 2021 07:25:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-cybersecurity-a-collaboration-issue/m-p/45644#M5477</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-05-25T07:25:27Z</dc:date>
    </item>
  </channel>
</rss>

