Traditional cybersecurity staff retention tactics becoming less effective
The recipe for improving your organization’s ability to hire and retain cybersecurity professionals is relatively straightforward (if not easy): offer an attractive pay, …
Small manufacturers play important role in supply chain security
Though the manufacturing sector does not attract the sheer volume of total cyberattacks as other areas of the economy, research has shown that coordinated cyber espionage …
ISACA refreshes COBIT framework to address latest business technology trends and standards
ISACA released its first update to the COBIT framework in nearly seven years. The new version, COBIT 2019, provides guidance to help enterprises better govern and manage their …
ISACA partners with national threatcasting initiative and releases its threatcasting labs
It’s impossible to predict the future with absolute certainty. However, ISACA, along with Arizona State University and the Army Cyber Institute, is aiming to get as close as …
ISACA to update CISA exam in 2019
ISACA’s Certified Information Systems Auditor (CISA) certification is being updated in 2019 to reflect the industry trends impacting the IT audit profession. Updated CISA …
Clarity and focus on security required for successful digital transformation
Digital transformation is all around us. Even if you are living under a rock, I am sure you have great Wi-Fi reception and are still able to do your shopping, pay your bills, …
9 in 10 organizations have a cybersecurity culture gap
With cybersecurity threats continuing to escalate worldwide, the ISACA/CMMI Institute Cybersecurity Culture Report found that just 5 percent of employees think their …
ISACA’s Cybersecurity Nexus introduces certificates for security beginners
Global technology and cybersecurity association ISACA has launched four certificates as part of its new CSX Foundations Series. Intended for entry-level security professionals …
ISACA introduces new credential to build and recognize auditors’ cybersecurity knowledge
Auditors are being required to audit cybersecurity processes, policies and tools to provide assurance that their enterprise has appropriate controls in place. To help them …
Better security needed to harness the positive potential of AI
Despite heightened interest in enterprise deployment of artificial intelligence, only 40 percent of respondents to ISACA’s second annual Digital Transformation Barometer …
Better security needed to harness the positive potential of AI, mitigate risks of attacks
Despite heightened interest in enterprise deployment of artificial intelligence, only 40 percent of respondents to ISACA’s second annual Digital Transformation Barometer …
Smart cities: New threats and opportunities
As smart cities integrate connected technologies to operate more efficiently and improve the quality of city services, new vulnerabilities arise that require diligent …
Featured news
Sponsored
Don't miss
- Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
- LastPass users targeted by vishing attackers
- Protobom: Open-source software supply chain tool
- The key pillars of domain security
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)