Certified Information Systems Auditor or CISA is one of the most sought-after certification programs in the world for IT and auditing professionals. CISA refers to a...
26 May 2022
All organisations with an online presence are vulnerable to a variety of cyber threats. Data breaches are one of the most prominent of these threats today. It’s a vulnerability...
15 February 2022
While a career in IT auditing can be extremely lucrative, it can also be very busy. With back-to-back meetings and calls, it's definitely not an easy job. Apart from the fact that...
9 February 2022
IT auditing is considered one of the most lucrative streams within auditing. This is because to be an IT auditor one requires specialized knowledge. There is also a lack of enough...
2 February 2022
The accounting sector is becoming increasingly reliant on information technology (IT). As a result, if you're interested in both auditing and IT, pursuing a career in IT auditing...
31 January 2022
Certified Information Systems Auditor or CISA refers to a designation issued by the Information Systems Audit and Control Association (ISACA). CISA certification is the standard...
28 January 2022
Firewalls have made up a popular subject of study for a long time now. The CISSP expects you to understand the advantages and disadvantages of different types of firewalls. It...
13 July 2020
This is a very logical question for any data and cybersecurity professional looking to upgrade their professional credentials with the right certification. In this blog, we aim...
4 May 2020
Legislation in the CISSP exam, in general, is not specific to any country. The exam does, however, expect you to know, at least at the definition/purpose level, the common...
6 March 2020
This article will support you in learning a few techniques to identify the important topics for your CISSP exam.
5 February 2019
Threat Intelligence is a widely used term now. If you are a cybersecurity professional, you must be familiar with the term even if you don't fully understand the nuances. Threat...
4 July 2018
As part of Cyber Management Alliance’s commitment to be continuous in being updated with the CISSP Syllabus changes, which went live on 15 April 2018, we have summarised below the...
15 June 2018
Not wishing to cause alarm but the CISSP exam is six hours long and has a total of 250 multiple choice questions. It is an exercise not only for your brain and thoughtful risk...
5 December 2017
With just 7 days to until your CISSP exam, ideally you should have covered the entire CISSP syllabus from the official ISC2 CISSP book. On top of that, if you’ve solved at least...
27 November 2017
Deciding to take the plunge and study for your CISSP qualification can be a big step. It’s often been a few years since they were a student for some who take this decision and...
7 November 2017
An interesting question and one that has arisen a number of times over the past couple of years, yet is hard to answer. If the CISSP exam is so popular, as we are led to believe,...
2 August 2017
Amar Singh, CEO and founder of Cyber Management Alliance, sat down with Adrian Davis, Managing Director EMEA at (ISC)2 and discussed the cyber security industry today, how they...
4 July 2017
Cyber Management Alliance’s CEO and co-founder, Amar Singh, talked to Adrian Davis, Managing Director EMEA at (ISC)2 about their new CISSP and SSCP qualifications, and the changes...
22 May 2017
Business Impact Analysis (BIA) is an important step within the Risk Management process. In order to complete a BIA exercise, a Risk Manager should engage stakeholders via a series...
16 February 2017
This is one of the lengthiest and a relatively important domain in CISSP. People working in technical roles find this domain difficult as it is more business-focused and relates...
14 February 2017
Introduction ISC2's CISSP remains one of the most r espected and in-demand certifications in Information Security. In many businesses around the world, CISSP is the de-facto...
14 November 2016
To say it's a challenge studying for the coveted and respected ISC2's CISSP when you are in your full time job and have family commitments is an understatement. I have gone...
21 October 2016
Let us learn today what is key difference between Least Privilege and Need to Know access principles.
21 May 2016
In the current business scenario, virtually every ERP application is vulnerable to unauthorised access, financial fraud, sabotage or espionage (leakage of industry secrets) from...
6 May 2016
In 2015, ISC2 (the official CISSP certification body) revised the CISSP official book from an earlier Third Edition to a new FOURTH Edition book with some changes.
14 April 2016