Annual cost of cybercrime highlights need for governance
ISACA commends the Ponemon Institute’s latest “Cost of cybercrime” report for the detail it provides on the indirect costs of IT security attacks, as well as …
IT control objectives for cloud computing
Cloud computing has become a major growth area in IT spending, and enterprises must adapt to the changes it brings to maximize the return on investment. To help organizations …
Regulatory compliance is a top concern in 2011
Regulatory compliance will be the top business issue affecting enterprise IT in the next 12 months, according to a new survey of more than 2,400 ISACA members from 126 …
IT governance and mobile technology
The mobile world is undergoing explosive growth. Luckily, enterprises are beginning to realize the potential gains and losses this technology offers, enabling them to act …
Governance has a central role in IT security
A major survey from ISACA confirms the central role that governance plays in information security within large organizations and stresses the fact that 95% of IT professionals …
40% of executives not planning to adopt the cloud
Forty percent of C-level executives have stated that they are not planning to adopt cloud computing, according to a report by ISACA. Respondents who do not plan to use cloud …
Minimizing virtualization risks
With its potential to reduce expenses, drive automation and provide flexibility, virtualization has earned its way onto the board agenda and is being implemented by …
Security tips for safer online shopping from mobile devices
47% of employees shopping online will use their company-issued mobile devices: notebook computers, tablets or smart phones. “Digital natives”—ages 18-34, the …
Employees will take bigger risks during this holiday season
Employees in the US plan to spend less time shopping online from a work-supplied computer this holiday season than they did a year ago, but more of them are engaging in risky …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)