Please turn on your JavaScript for this page to function normally.
ISACA releases guide for performing business-relevant assessments

Establishing confidence in IT processes and controls is important, but audit and assurance processes often represent a pain point for business partners. Their perception is …

The top three threats facing enterprises

Globalization and mobility are fueling opportunities for enterprises today, but they have a nemesis: amplification. As physical perimeters become flexible and the tools and …

Governance and assurance guidance for big data

Big data can save big money. A recent McKinsey report found that value gained from data in the US health care sector alone could be more than US $300 billion every year. But …

Do APTs present a credible threat to national security?

A global cybersecurity survey of more than 1,500 security professionals found that more than one in five respondents said their enterprise has experienced an advanced …

Guidance on cybersecurity, private clouds and privacy

ISACA today issued guidance on managing three top trends posing major challenges to businesses in 2013: cybersecurity threats, private vs. public clouds and data privacy. …

Can you trust the cloud?

Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that cloud security issues (84.4%) and cloud privacy and compliance issues …

Privacy compliance laws: Why the European Commission finally got it right

The debate about privacy compliance has always been a heated one. Add to the mix new European Commission legislation and you have a recipe for not only a lively debate but …

Top 10 issues eroding cloud confidence

Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and international data privacy dominate the Top 10 areas …

From identity and access solutions to access governance

The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of …

ISACA issues COBIT 5 for Information Security

ISACA released COBIT 5 for Information Security, which builds on the COBIT 5 framework to provide practical guidance for those interested in security at all levels of an …

Highest paying IT certifications

ISACA’s Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) credentials have been named two of the highest-paying …

IT candidates should shift career perspectives

Recruiting in the technology sector is strong, despite weaknesses and structural changes the economy has experienced over the past several years. Enterprises seem to be …

Don't miss

Cybersecurity news