Strategies for effective data analytics
Organizations with effective data analytics can make stronger business decisions by learning what is working and what is not, what they are doing well, and where they need …
Annual cost of cybercrime highlights need for governance
ISACA commends the Ponemon Institute’s latest “Cost of cybercrime” report for the detail it provides on the indirect costs of IT security attacks, as well as …
IT control objectives for cloud computing
Cloud computing has become a major growth area in IT spending, and enterprises must adapt to the changes it brings to maximize the return on investment. To help organizations …
Regulatory compliance is a top concern in 2011
Regulatory compliance will be the top business issue affecting enterprise IT in the next 12 months, according to a new survey of more than 2,400 ISACA members from 126 …
IT governance and mobile technology
The mobile world is undergoing explosive growth. Luckily, enterprises are beginning to realize the potential gains and losses this technology offers, enabling them to act …
Governance has a central role in IT security
A major survey from ISACA confirms the central role that governance plays in information security within large organizations and stresses the fact that 95% of IT professionals …
40% of executives not planning to adopt the cloud
Forty percent of C-level executives have stated that they are not planning to adopt cloud computing, according to a report by ISACA. Respondents who do not plan to use cloud …
Minimizing virtualization risks
With its potential to reduce expenses, drive automation and provide flexibility, virtualization has earned its way onto the board agenda and is being implemented by …
Security tips for safer online shopping from mobile devices
47% of employees shopping online will use their company-issued mobile devices: notebook computers, tablets or smart phones. “Digital natives”—ages 18-34, the …
Employees will take bigger risks during this holiday season
Employees in the US plan to spend less time shopping online from a work-supplied computer this holiday season than they did a year ago, but more of them are engaging in risky …
Featured news
Resources
Don't miss
- PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)
- Italian-made spyware Dante linked to Chrome zero-day exploitation campaign
- Managing legacy medical devices that can no longer be patched
- Chain of security weaknesses found in smart air compressor model
- Review: The Wireless Cookbook