No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
Organizations grant network access nearly every minute of every day. Hackers frequently try to get inside networks using co-opted access credentials. Yet most IT departments still review access privileges only quarterly or semiannually.
Addressing Cybersecurity Vulnerabilities. 10 areas of improvement to help security professionals detect, prevent and address security incidents.
As organizations enter the international context and leverage their IT operations, their visibility increases.
Detective controls are a key component of a cybersecurity program in providing visibility into malicious activity and attacks on an organization’s IT environment.
Most people probably lock their doors when they are not at home. They trust that the things they value—family photographs.
There are many steps that can be taken to avoid a cyberbreach, but statistically speaking, the odds are that every company has been or will be breached at some point.
According to the Symantec Internet Security Threat Report (ISTR), the annual cost of cybercrime to consumers in the US is more than US $38 billion. Visit this article for more information.
How do I ensure that my organization has controls to protect itself from cyberrisk? In other words, what are the key controls that my company must implement to protect itself from cyberrisk?
My honest thought about monitoring is: I do not like being monitored! I am not alone. A large majority of individuals and organizations would assert that they do not like being monitored.
Stanley Baldwin was a British politician who won numerous national elections in the 1920s and 1930s.
Large software projects have been notorious because of: Their large budget and timescale overruns, Failing to deliver the promised benefits and more!
What has been, or do you anticipate being, the biggest compliance challenge in 2015?
Those who peruse this book can gain a clear understanding of how the establishment of the right processes, organization and technologies can guarantee the accomplishment of corporate governance goals.
This three-part series within the IS Audit Basics column continues a discussion on a matter that, over many years, has been of concern to business managers everywhere.
Former US President John F. Kennedy said, “The Chinese use two brush strokes to write the word ‘crisis.’ One brush stroke stands for danger; the other for opportunity. In a crisis, be aware of the danger, but recognize the opportunity.”
Corporate entities and retailers are scrambling to shore up network security by addressing the primary vulnerability of network security: the login. Unique behavioral biometrics may be the solution.