No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
Process guidelines and a framework for boards of directors and senior management must be considered when providing oversight, examination and risk management of third-party business relationships in the areas of information technology, systems and cyber security.
There is no stagnation in information security. One major national incident often leads to more robust reporting requirements.
Digital identity has the power to propel your enterprise forward…or it can cause you to crash and burn. How you govern and manage it will make all the difference.
Sandboxes are widely used to detect malware. They provide a temporary, isolated and secure environment to observe if a suspicious file attempts anything malicious.
By showing what would have changed if a previously successful big data analytics project was performed given today’s governance.
The ISO and the IEC’s ISO/IEC 27001:2013 standard has defined the requirements for an information security management system (ISMS).
As a relentless wave of cyberattacks continues, organizations are under intense pressure from key stakeholders and regulators to implement and enhance their cyber security programs to protect customers, employees and the valuable information in their possession.
We are in the process of selecting a data loss prevention (DLP) tool.
I do not believe in information security.
By the time this article is published, it will have been about 20 months since the US Federal Bureau of Investigation (FBI) unlocked the iPhone of the San Bernardino, California, gunman who killed 14 people.
How do you think the role of IS auditor is changing or has changed?
In the world of information systems, data has gained the most influential position. Data are about entities—resource.
An IoT Control Audit Methodology. As the IoT industry evolves, more controls can be added to the method as required.
In day-to-day vocabulary, a line of defense is defined as a structure used to defend against attack.
In their capacity as a tool, computers will be but a ripple on the surface of our culture.
Configuration Management: Using COBIT 5 provides a clear and concise walk-through of the configuration management process and associated threats, mitigation actions, COBIT 5 enablers and other useful information.
The security of technology has become an increasing global concern.
US National Security Agency (NSA) hacker tools dumped on the dark net, based on the EternalBlue exploit, are continuing to evolve into attacks increasing in frequency and severity.
Security, Audit and Control Features: Oracle Database 3rd Edition aims to assist assessors in reviewing the security of an Oracle database environment.
There are many insightful posts across the Internet that discuss certification. Do credentials matter? Do certifications lack value? Are industry credentials even worth pursuing?
In today’s always-connected world, the concept of device connectivity, the Internet of Things (IoT), has already solidified.