No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
IT professionals and enterprise board members live in two very different worlds. Boards worry about strategic concerns such as revenue.
One of the major challenges chief information security officers (CISOs) face in almost any organization is prioritizing information security interests with regard to IT interests.
The exposure of data for up to 14 million of Verizon’s customers in July 2017 was an enormous embarrassment, particularly for an organization that presents itself as a premium cybersecurity consultancy.
Is the CIO role still relevant for IT security in healthcare? The world of information and data management is changing faster than anyone could have predicted.
Theft of intellectual property (IP) is an emerging threat and a topic of boardroom conversation for organizations across the United States, particularly for those in the high-tech industry.
When people hear the term “cyberwarfare,” there are a few things that come to mind.
The methodology of network security has changed drastically due to the aggressive pace at which data have grown and the need for constant real-time access becoming the norm.
Every year, ISACA conducts its annual Global State of Cybersecurity research. The second part of the survey asks about security practices in the field: what is working and what is not.
How can we assess risk associated with blockchain technology?
I have been a data center rat my whole career, starting as a systems engineer for a hardware vendor and, today, as a consultant.
Determining pre-audit planning for the subject, objective, scope, and procedures for data gathering.
As technology continues to transform the way people consume information, the work of ISACA’s professional community becomes more important—and challenging.
How do you think the role of the IS audit professional is changing or has changed?
Healthcare technology is at a critical juncture of rapid growth, seamless implementation and the need for constant adaptability.
Hacked! Attacked! Leaked! Daily news headlines scream high-profile information security failures and their consequences.
The majority of modern organizations have embarked on the path security operations centers (SOCs) are building.
The purpose of risk management is to protect the values of an organization.
As organizations try to keep up with rapid changes in technology, they are using acquisitions as a way to quickly develop entirely new lines of business or to simply close gaps in technological capability.
Hospitals, major organizations and government offices across the globe had been hit by a massive wave of cyberattacks that seized control of computers until the victims paid a ransom.
In terms of cybersecurity, many organizations tend to worry about external threats such as hacking or distributed denial-of-service (DDoS) attacks.
“Data breach” has become a common term, so much so that it seems as though not a day goes by without mention of a data breach occurring.
The use of Windows accounts to authorize users to applications introduces risk that an auditor should evaluate.