No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
The Internet of Things (IoT) is an ecosystem of connected things (stationary or mobile devices). 34 billion devices are to be connected to the Internet by 2020.
Does the recent distributed denial of service (DDoS) attack on Dyn officially mark the passing of the Internet of Things (IoT) fear, uncertainty and doubt (FUD) stage, or is this still the beginning of the stage?
In today’s age of bring your own device (BYOD), the smartphone is one of the preferred mobile devices to access enterprise information.
During the Internet of Things (IoT) Village held at the DEF CON security conference in August 2016, 47 new vulnerabilities affecting 23 IoT devices from 21 manufacturers were disclosed.
Various surveys point out that 20 to 50 billion devices will be connected using the Internet by 2020.
At each stage in the evolution of information security, there has been a problem—access control, viruses, hackers, data leakage, to name a few—that has seemed insuperable.
A previous column reviewed the domains of data and information audits.
How do you think the role of the information security professional is changing or has changed?
In any walk of life, two things are true about failures: They are common and nobody likes them. They cannot be entirely avoided for various reasons.
The relationship between cybersecurity and the regulatory requirements for data governance, data stewardship and enterprise data management is set to strengthen.
Asymmetric warfare is “the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent’s strengths while exploiting his weaknesses.”
Controls and Assurance in the Cloud: Using COBIT 5 provides comprehensive process practices and a governance framework to use when conducting an assessment of cloud computing, including its associated security risk.
HTTPS has been around since 1994. Historically, HTTP over Secure Sockets Layer (SSL)/Transport Layer Security (TLS) was treated as a dark and capricious form of magic best left undisturbed.
The 5 Whys tool has been around since the 1930s. It is simple and effective but unknown to many.
The first steps in information security strategic planning in any form of business are risk management and risk evaluation.
Organizations today are concerned about information security primarily due to the fact that the type and nature of attacks are undergoing a lot of changes that make them difficult to detect and prevent.
Security Considerations for Cloud Computing provides a brief overview of cloud computing, its associated security risk and information for decision makers in an organization.
The statement of applicability (SoA) is the main link between risk assessment and risk treatment in an enterprise or in an organization within an enterprise and, therefore, is a requirement for information security management system (ISMS) implementations.