No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
Guide to Auditing Attachment Fields in Access Databases. Examples include customer records, employment records, inspection reports & patient records.
A key issue often cited by information systems (IS) executives in the last three decades is aligning IT with business, which assists in realizing value from IT investments.
IT governance, also referred to as governance of enterprise IT (GEIT) or corporate governance of IT, is a subset of corporate governance that is concerned with enterprise IT assets.
The metrics associated with privacy data breaches are astounding. In 2016, 554, and454,942 records were breached from 974 reported incidents.
In 2012, a software developer who mainly worked remotely for a US firm had the idea of fully outsourcing his work to China.
Social media is a powerful tool that gives organizations the ability to expand their brand value; it can also tarnish a brand overnight.
Mobile has arisen as one of the most flexible—and most prevalent—business tools available. From email to calendaring to business applications.
The question I have is what are the privacy issues associated with these mobile teams using their own devices for the organization’s work?
Some time ago in this space, I used an obscure statement by a nearly forgotten British Prime Minister to make some points about cyber security.
ISACA reviews how to create an audit program, utilizing good reference resources & collaboration with IS peers.
How do you see ISACA growing and adapting to the constantly changing marketplace and needs of its constituents over the next year?
Blockchain is a distributed database that maintains a continuously growing list of records called blocks that are secured from any kind of tampering and revision efforts.
It is no secret that phishing has become a huge problem. In 2016, the Anti Phishing Working Group noted that there were 1,220,523 total phishing attacks.
The Emirates National Oil Company embarked on an initiative to realize value out of IT assets through Information Technology Infrastructure Library (ITIL) process implementation.
Industrial control systems (ICSs) are changing by relying more on off-the-shelf information technology (IT), thereby exposing these systems to more IT risk.
Enterprise Security Architecture—A Top-down Approach. SABSA, COBIT and TOGAF & their relationships with security framework for enterprises.
In this article, the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) ISO/IEC 27001:2013 standard is introduced briefly and compared to ISO/IEC 27001:2005.
Cyberrisk is a universal issue. The trustworthiness of various risk assessment methods in pursuit of risk-based decisions is largely questioned in the marketplace.
Transforming Cybersecurity, published by ISACA, should be read in the context of COBIT 5 for Information Security and the COBIT 5 framework.