No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
Love them or hate them, cryptocurrencies have been turning the financial world upside down over the past few years.
Boards of directors (BoDs) should be involved in directing and leading their organizations toward digital transformation, ever wary of the not inconsiderable risk scenarios along the way.
Boards of directors (BoDs) are ultimately accountable for strategic decision-making and control in organizations.
Blockchain’s disruptive effect is widely recognized in the financial sector, although the level of awareness in other sectors and their professions is still in its infancy.
The value in software is realized only when the end product is in the hands of its intended users. Traditional software development can be slow.
As new businesses are created and old ones spun off, processes evolve, technologies are adopted, and regulatory demands fluctuate, the internal audit function must develop new approaches to advise management on key issues, anticipate risk and be more forward-looking.
Considering the changes happening in IT, I feel there is a need for updating my skills; however, I am not sure what studies I should pursue to ensure that my skills are not outdated.
In the IT and cybersecurity realms, change is inevitable. Digital advancements fuel innovative ways of doing things.
The last time there was a shift…in the way information technology was organized occurred when we moved from massive centralization—mainframes to distributed processing.
Determining the IoT pre-audit planning for the subject, objective, scope, and procedures for data gathering.
How do you think the role of the cybersecurity professional is changing or has changed?
Corporations today, especially large corporations, find acquisitions to be a crucial means to achieve their strategy.
In the last few years, there has been an increase in the usage, volume and importance of data and analytics.
Most organizations would agree that it is a good practice, albeit not an easy one, to establish rules relating to the amount and type of access to provide to particular job roles.
Ransomware infections are rising exponentially. Attackers are motivated to extort money from individuals and organizations by infecting their systems with malicious code.
On 27 June 2017, A.P. Moller-Maersk, Merck & Co., Inc., TNT, WPP, DLA Piper, Rosneft, the Ukrainian state postal service and Princeton Community Hospital in West Virginia, USA, were among the numerous organizations...
You may have heard the adage, “Insanity is doing the same thing over and over again and expecting different results.”
Despite the phenomenal growth in the digital world and crimes committed using digital techniques and tools, there are literally no foundational requirements to perform digital forensic investigations.
Red teaming has been a buzzword in the cybersecurity industry for the past few years.
Progressive organizations know that risk is a fact of business. More than that, they recognize the need for integrated and sustainable solutions to address critical operational failures.
Most people, including many readers of this article, live in cities.