No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
Auditing Linux/Unix Server Operating Systems. This review covers auditing the physical security system, passwords, servers, & much more.
With increasing privacy laws and regulations, global data privacy risk has become one of the major drivers of spotlighting the role of IT auditors.
The rapid development of computer and networking technologies has increased the popularity of the web.
Security & Privacy Challenges of IoT-enabled Solutions. The diversity of services for IoT means no one company can develop a full end-to-end solution.
Given the centrality of IT for enterprise risk management and value generation, a specific focus on governance of enterprise IT (GEIT) has arisen over the last two decades.
It is common knowledge that building security into software is an important prerequisite for information assurance.
From businesses to government agencies, nearly every entity contracts some aspect of software development, system integration and hosting services—creating an emerging crisis in accountability.
Outsourcing is often a default strategy for today’s businesses. While it has huge potential benefits to offer enterprises.
How should I go about establishing the security function and building a culture that is supportive to controls implementation?
Social media marketing firm ViralMint rolled out a new feature that proved so popular that the increased customer traffic swamped the capabilities of the existing load balancer solution and greatly increased application response times.
I suspect I share with many readers of the ISACA Journal an annoyance with customer service people who tell me that they cannot give me any information because the system is down.
IS Audit Basics: Helping Auditees Prepare for an IS/IT Audit. Suggestions for how to facilitate the preparation for & conduct of an IS/IT audit.
What is the biggest security challenge being faced in 2015? How should it be faced?
In their ongoing quest to increase productivity, enhance operating efficiencies and reduce costs, more and more IT executives are moving to the cloud.
FISMA Compliance Handbook is a valuable reference guide to compliance requirements in the United States.
IS/IT can be found virtually everywhere, and when it fails to deliver the services that people need, the result is discontent or worse.