No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
Innovation is the process of transforming an idea or concept into a functional and marketable value proposition reflecting creative opportunity.
A top-down approach to enterprise security architecture can be used to build a business-driven security architecture.
The threat landscape has changed significantly for operational technology (OT) environments as their connectivity to IT networks and the Internet has exponentially increased.
The new COSO ERM framework document, Enterprise Risk Management—Integrating With Strategy and Performance, is expected to have a level of global influence similar to Internal Control–Integrated Framework.
In February 2014, one of the biggest discount retailers in the United States, Target Corporation, reported a data breach within its network system that caused the leak of 110 million customers’ financial and personal information.
In 2016, there were instances where cybersecurity stocks did not fare well, and one reason attributed to this occurrence was that investors needed some high-profile breaches2 to lure them back into investing in cybersecurity stocks.
This article identifies Linux distributions that provide collections of hundreds or, in some cases, thousands of tools, many of which audit professionals might find valuable.
Traditionally, our organization has a policy to adopt established technology solutions.
The concept of an organization’s information systems operating in a space and on equipment owned by that organization has been replaced by systems residing in.
In June 2015, ISACA began publishing a set of white papers titled “Innovation Insights.”
What is the biggest security challenge that will be faced in 2018?
Over the past several years, big data has emerged as one of the top strategic technology priorities for organizations.
It is no surprise that many enterprises, ranging from early start-ups to mature global enterprises, have considered or implemented a migration to Amazon Web Services’ (AWS) cloud computing services.
Designed to give European Union residents better privacy rights, the EU General Data Protection Regulation (GDPR) comes into force in May 2018.
How the digital transformation turns out may depend on how well it supports core values such as prosperity, fairness, integrity, transparency and privacy atop an Internet that erodes some of these values.
Innovative ideas pave the way for efficient and seamless governance in any type of organization.
Much of today’s new technology may not impact the organization’s business directly, but it almost certainly will impact it indirectly
Access certification involves a manager or system owner reviewing users’ entitlements (access) to a system or systems to ensure that the users have access to only what they need.
The cybersecurity problem in a nutshell is that criminals are launching cyberattacks against the global attack surface comprised of the world’s people.