No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
This article describes how to create and view attachment fields, as well as how to audit attachment fields in Access databases.
The transformations experienced by organizations due to technological advances has made information.
Information security events that affect cloud systems are occurring with no end in sight - the cloud should be treated as a non secure environment with numerous threats and concerns.
One of biggest budget busters for an information security program is technology solutions that are not a good match for the organization.
There are a number of definitions of Internet of Things (IoT), with all of them having slightly different meanings.
COBIT 5 processes can improve the effectiveness of enterprise security in an organization. In this article, we discuss how they are essential for enterprise security.
There has been rising interest in adopting e-health governance frameworks to obtain reassurance that investments return the expected results in health care.
What are the key controls that we must consider for assessing the third-party vendor?
Entrepreneurship and small business are at the core of economic growth. After all, and new giants such as Google and Facebook germinated from humble beginnings.
I did a Google search on the word cyber and was told there are 467 million references to that term. This seems to me an awfully exact number, but I guess we can agree there are a lot of references.
An online search for audit success criteria reveals few articles or books specific enough to be useful.
What are your three goals for 2015?
The book’s objective is to provide a comprehensive understanding of cybersecurity. Its target audience is anyone interested in the field of cybersecurity, ranging from students to educators and professionals.
Enterprise resource planning (ERP) aims to enhance business productivity, quality and efficiency by integrating operations and processes.
The book covers preventive measures or controls, including the boards responsibility, the importance of good governance and robust enterprise risk management (ERM).
This article begins an exploration of some of the human factors that play a role in an auditor’s success.
The implementation of and certification to global best practice standards can be quite challenging for most organizations given the resources.