No items have been added to your cart yet
Learn more about the governance of emerging technology and much more.
The chaos theory was discovered in the mathematics field and began to be observed in daily life during the second half of the 20th century.
It is only recently that quantitative risk for information security has been introduced as a possible evolution from qualitative risk methodologies.
So, and in case you have been living in a cave somewhere, ISACA is 50—a significant historical milestone. Here are the lessons we've learned along the way.
Banks need to design automatic & continuous risk assessments that align with compliance & regulatory issues.
Internal audit leaders are looking at automation technologies for many of the same reasons as business management.
Artificial intelligence (AI) and robotics have captured the imagination of humans. A quick search for AI and robotics in pop culture finds that it stretches back to Mary Shelley’s book.
The Internet of Medical Things (IoMT) is and has been a driving force of the networked medical device landscape ecosystem.
Not all that long ago, getting the enterprise to invest in IT required some convincing.
The DevSecOps methodology movement began in response to security concerns with the DevOps methodology.
With the perpetual occurrence of high-profile attacks and data breaches caused by software vulnerabilities, a new trend known as secure by design (“shifting left”) has gradually shaped the software world.
Each year, reports of new threats and security breaches reveal the ever-increasing sophistication of attackers and their methods for outwitting available control mechanisms.
Running an IT department used to be so simple. The programmers wrote programs; the technicians migrated the programs into production; and the operators ran them. Learn how this has changed.
Organizations embrace innovation in order to outcompete others in their space. The mission in audit is to protect the business.
What is the biggest security challenge being faced in 2019?
Is enterprise governance of IT (EGIT) relevant for SME organizations?
Today’s organizations find themselves facing a relatively new challenge—governing and managing sustainability—since sustainability has become an important issue and is increasingly essential for business.
User access review is a control to periodically verify that only legitimate users have access to applications or infrastructure.
C-level executives, security professionals, IT technicians and audit managers face constant pressure to assess, assimilate and govern emerging technology, including artificial intelligence (AI).
Corporate governance refers to the set of responsibilities to be fulfilled by the higher-level management structures of an organization, such as the management team, board of directors (BoD), and board and management committees.
There is a new cyberthreat that is growing with the potential to have major impact on information security and personal privacy.