Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
ISACA’s Certified Information Security Manager (CISM) Certification Early Exam Registration Deadline
Certified Information Security Manager (CISM)
The management-focused CISM is a unique certification for individuals who design, build and manage enterprise information security programs. CISM is the leading credential for information security managers..
The CISM certification promotes international practices and individuals earning the CISM become part of an elite peer network, attaining a one-of-a-kind credential.
Linux Security, Then and Now
Linux is inherently not a secure operating system. The reason it’s not secure is because Linux was based on the architectural design of UNIX, and the creators of UNIX didn’t care about security – it was 1969 after all.
“The first fact to face is that UNIX was not developed with security, in any realistic sense, in mind; this fact alone guarantees a vast number of holes,” Dennis Ritchie wrote in his paper, “On the Security of UNIX” in 1979.
ISACA’s Certified Information Security Manager (CISM) Certification Early Exam Registration Deadline
Certified Information Security Manager (CISM)
The management-focused CISM is a unique certification for individuals who design, build and manage enterprise information security programs. CISM is the leading credential for information security managers..
The CISM certification promotes international practices and individuals earning the CISM become part of an elite peer network, attaining a one-of-a-kind credential.
Linux Security, Then and Now
Linux is inherently not a secure operating system. The reason it’s not secure is because Linux was based on the architectural design of UNIX, and the creators of UNIX didn’t care about security – it was 1969 after all.
“The first fact to face is that UNIX was not developed with security, in any realistic sense, in mind; this fact alone guarantees a vast number of holes,” Dennis Ritchie wrote in his paper, “On the Security of UNIX” in 1979.

