No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
Benefits & the Security Risk of Software-defined Networking. Software-defined networking (SDN) uses virtualization to expand network efficiency.
Sharing, collaboration and anywhere access are the prominent features of modern cloud applications. However, cloud security faces scalability challenges.
The networking industry is gradually transforming itself from a hardware-centric approach to a software-defined platform.
The Internet of Things (IoT) is an evolving concept and is described in various ways, and one of the most common being an infrastructure of interconnected objects.
Cloud adoption continues to grow at a rapid pace, and transforming businesses across the globe. Here are some top considerations for business leaders.
Mobile App Security—Audit Framework. For the proper controls on mobile apps to be developed & tested, one must first dissect the layers of risk.
Mobile Computing Device Threats, Vulnerabilities & Risk Are Ubiquitous. Review the actors, threats, vulnerabilities, & risk with mobile devices.
Ask any merchant and he/she will tell you that accepting credit card payments comes with its own set of security challenges.
Network Access Control: Has It Evolved Enough for Enterprises? Does it need a more usable technical solution before it is utilized everywhere?
In this article, ISACA explains how there is no need for a chief cyber officer because the chief information security officer (CISO) performs that function.
IS Audit Basics: Elements of an IS/IT Audit Strategy, Part 1. IS/IT strategy steps for auditors to define, target, & determine resources needed.
What is the biggest security challenge that will be faced in 2016? How should it be addressed?
Advanced Persistent Threats: How to Manage the Risk to Your Business is available from the ISACA Bookstore.
For many information systems auditors, reviewing domain accounts in an Active Directory (AD) environment is sufficient for testing controls around user authentication.
IS Audit Basics: Elements of an IS/IT Audit Strategy, Part 2. Key elements of the audit including audit strategy & derived plans chosen.
Many believe this is a period in human history in which geopolitical tensions perpetuate uncertainty.
Securing Mobile Devices. Guide for security professionals & governance, risk & compliance in using COBIT 5 framework to obtain assurance in auditing.
The topic of information security has evolved to one of the top concerns among policymakers and corporations.
Conducting onsite interviews is a critical part of any IT audit and can lead to the gathering of information not readily apparent through reading documentation and examining physical evidence.
The New Age of Near-zero Privacy. ISACA examines the rapid loss of privacy & how to mitigate exposure risk of personal data and images.