Skip to main content

Opinion on Associations, Certifications, or Organizations

Does Associations, Certifications, or Organizations in general add value to our self, work, or advocacy? The answer is never simple.

One Defining Criteria

Is the body of knowledge of the association, certification, or organization relevant to the time and trend?

The field of information security is ever evolving and changing. It is only fitting that any association, certification, or organization that one chooses to subscribe to must be ever evolving and changing as well. It must be able to match the rapid changes of the industry.

You might be thinking but this does not answer the question posed. Well, use the criteria above to the association, certification, or organization every six months. If it does not pass that criteria, then it is of very little value to us.

Further Discussion

I do not think that relevance to the time and trend needs further explanation or exposition, but if you feel otherwise, your thoughts and discussion is always welcome down in the comments below. I'd very much love to read/listen to different and conflicting views.

Comments

Popular Posts

Attack Example - ClickJacking+Spoofing - UI Redress - Trusted User Interface

ClickJacking and Spoofing Attack Example - Trusted User Interface attack. It used to be that the most common operating system and browser being targeted for this kind of attack is Windows and IE. The underlying reason was that Windows has more users and Internet Explorer was basically File Explorer having a different user interface. Today, the attack surface is wider and much more complicated to notice. The screenshot posted here is a combination of a User Interface (UI) spoofing from a ClickJack.

Attack Example - Phishing - SMS Based - Smishing

What exactly is Phishing? It smells fishy, sounds like fishing, and it is exactly fishing. Knowing how social Filipinos are, almost everyone doesn't like being late in knowing who's an item in the office or who likes who, or what successful neighbors are doing to be successful. And so, we non-chalantly fish for information about it. That is exactly the core function of Phishing. It is to gather Personally Identifiable Information (PII) or information which can be used to identify individuals.