Please turn on your JavaScript for this page to function normally.
risk
64% of IT decision makers have reported a breach in their ERP systems in the past 24 months

ERP applications are ‘critical’ to business operations, according to the IDC survey of 430 IT decision makers. ERP-related breach Sixty-four percent of the 191 decision makers …

check
Being compliant with laws and regulations is not a guarantee against data breaches

Compliance is not a guarantee against data breaches. These are the results of the Advisera survey carried out with 605 respondents, coming from countries on five continents, …

ISC2 report
How security programs and breach history influence company valuations

96% of cybersecurity professionals indicated that cybersecurity readiness factors into the calculation when they are assessing the overall monetary value of a potential …

compliance
The use of SOX-specific solutions has more than doubled since last year

There’s a growing demand for advanced technologies to streamline Sarbanes-Oxley Act (SOX) compliance, according to a survey released by the SOX & Internal Controls …

magnify
Cybersecurity, privacy and technologies still top challenges for IT audit teams and leaders

Cybersecurity, privacy and technologies—from mission-critical to digitally transformative—top the list of challenges IT audit teams and leaders grapple with every day, …

users
Nearly two-thirds of organizations say tech skills gap is impacting IT audits

Technologies such as AI are reshaping the future of IT auditors, but auditors are largely optimistic about the future, according to new research from ISACA. In the Future of …

editor
The percentage of open source code in proprietary apps is rising

The number of open source components in the codebase of proprietary applications keeps rising and with it the risk of those apps being compromised by attackers leveraging …

idea
IT audit best practices: Technological changes give rise to new risks

IT security and privacy, IT governance and risk management, regulatory compliance, emerging technology and cloud computing are the key issues impacting IT audit plans in 2018, …

Wire
Wire shares results of independent security audit of its secure messaging apps

When I last spoke to Alan Duric, co-founder and (at the time) CEO of the company developing secure messaging application Wire, he stressed the importance of independent and …

blocks
Soon, organizations will be valued on their information portfolios

By 2021, the prevalence of equity analysts valuing organizations’ information portfolios in valuing businesses themselves will spark formal internal information …

magnifying glass
Security audit of Dovecot mailserver reveals good security practices

Dovecot – a popular open source IMAP and POP3 server for Linux/UNIX-like systems – is as secure as its developers claim it is. A security audit performed by German …

keys
OpenVPN to get two separate security audits

VPN service Private Internet Access (PIA) announced that they have contracted noted and well-reputed cryptographer Dr. Matthew Green to perform a security audit of OpenVPN. …

Don't miss

Cybersecurity news