No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
Service organizations with a bespoke application in a regulated industry have special challenges in addressing application vulnerabilities.
In recent years, the impact and frequency of cyberattacks have significantly increased, from millions of personal records compromised to hundreds of millions and even a billion records in the case of Yahoo.
Although generalized audit software (GAS) has been shown to significantly improve the efficiency and effectiveness of audits, many auditors do not use this technology.
Blockchain technology, commonly expected to drive the next wave of digital infrastructure and process innovation, is rapidly developing into maturity.
Innovations in the marketplace have accelerated sharply, and the implications have tremendous impact on the business environment.
A company facing privacy and security challenges can leverage culture to implement necessary procedural and technological transformations to strengthen security.
Data centers used to be so simple.
The Institute of Internal Auditors (IIA) defines internal auditing as an independent, objective assurance and consulting activity designed to add value and improve an organization’s operations.
How do you think the role of the cyber security professional is changing or has changed?
Recently, an article in The Wall Street Journal revealed that IT outsourcing companies in India had reduced the number of H1B (worker) visa applications made to the authorities in the United States even before President Trump voiced his concerns about the negative impact of such visas on the US labor market.
Sometimes, it can feel as though auditors get the short end of the stick when it comes to the tools available to assist in the work that they do.
“The hackers focused on overcoming our security controls while the security and compliance teams were measuring our security in terms of adherence with formal compliance certification.”
Every day, between 10 and 20 vulnerabilities are publicly disclosed, a few more than that are discovered, and an estimated 10-100 times that are created by software developers around the world.
It is unlikely that anyone is ignorant of the concept of full disclosure. While today we often see it applied to cyber security and the like.
Using mobile devices to complete commercial transactions is a newer scientific advancement in the information and communication technology (ICT) sphere.
Over the last 20 years, organizations have realized that they need to effectively manage and retain high-quality employees in order to be successful.
Businesses seeking to establish themselves in privileged positions in a digitally modified society must anticipate the competition and explore new opportunities in unstable environments.