ISC2 introduces new accreditations driven by the push for security-by-design

ISC2, a professional security training and accreditation body, is set to launch a new software security certification in response to the growing adoption of security-by-design principles around the world. The certification aims to upskill professionals in this important area of security practice. Security-by-design is an approach to software and hardware development that prioritizes security through continuous testing, authentication standards, and coding best practices. It addresses the common problem of security being neglected in product development. The UK’s upcoming Product Security and Telecommunications Infrastructure Act enforces security-by-design for connected products. Both the UK and US cyber agencies have also published guidelines on incorporating security into the development of artificial intelligence systems. ISC2’s recent Cybersecurity Workforce Study found a skills gap in application security, indicating increasing demand for professionals with expertise in this area. To address these trends, ISC2’s Certified Secure Software Lifecycle Professional Self-Paced training course focuses on skills in authentication, authorization, and auditing throughout the software development lifecycle. It incorporates AI features to provide adaptive and personalized learning experiences based on each learner’s unique needs and knowledge. The course enables professionals to develop in-demand skills and meet market demands for secure technology development.

Unlock your business potential with our expert guidance. Get in touch now!

silenced-gagged-secret-Michael-adobe.jpg

Post Office Criticized for Deleting Comments on IT Scandal from Social Media

Whitehouse-fotolia-scaled.jpg

When Leaders Overlook Cybersecurity Guidelines, the Entire System Suffers

Police-crime-2-adobe.jpg

Police Digital Service Board Director Resigns Months After CISO’s Departure

surveillance-CCTV-facial-recognition-Gorodenkoff-adobe.jpg

Essex Police Reveals ‘Incoherent’ Facial Recognition Evaluation

chatbot-1-fotolia.jpg

Podcast: RSA 2025 – Navigating AI Risks and the CISO’s Role

hybrid-cloud-storage-fotolia.jpg

Trump’s Visit Strengthens Saudi Arabia’s AI Initiatives

threat-management-fotolia.jpg

Security Tests Uncover Major Vulnerability in Government’s One Login Digital ID System