No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
The use of artificial intelligence (AI) in cyber security will help organizations enhance existing application security capabilities.
Big data seems indeterminate due to its constant use in intellectual data science fields and science, technology and humanities enterprises.
Cloud applications (apps) and services have revolutionized business productivity and efficiency by providing a robust and flexible environment in which to share and transfer data.
Big data can be described as a huge volume of data that cannot be treated by traditional data-handling techniques.
Nobody intends to lose data, and but it happens. Often. Immature processes, inadequate tools and unaware users reveal themselves as the weak links.
Machine learning is revolutionizing many industries, from banking to manufacturing to social media.
Data protection is critical, but it can sometimes be less visible than other types of security controls.
The European Union (EU) General Data Protection Regulation (GDPR) will take effect in May 2018.
A few columns back, I wrote about the security of multi-modal IT environments, and in which applications and infrastructure are operated in colocation (colo) sites.
ISACA reviews 4 backup and recovery principles as the technology evolves due to technological improvements.
What is the biggest security challenge that will be faced in 2018?
Determining the level of process maturity for a given set of IT-related processes allows organizations to determine which processes are essentially under control and which represent potential pain points.
Cyber Incident response is no different than any other type of warfare. It requires strategy, and tactics.
Around 2007, it became obvious that the information security defenses that were implemented by the government and businesses to prevent data loss were not totally effective.
While today everyone worships their smartphones as if the device itself demands their constant and public attention, there’s a new transformative technology that’s even more pervasive—practically inescapable—and yet largely invisible to the average person.
ISACA Privacy Principles and Program Management Guide provides a comprehensive explanation of all things privacy.
There are best practices and guiding principles that firms must rely on to develop, adjust and mature their security monitoring strategy, processes and procedures.
The number of data breaches annually totals thousands in the United States alone. More importantly, the total number of records exposed has reached the billions.
Every organization should know what information is circulating on the Internet about its activities so that it can use concrete actions to handle any potential threats.
The “Kodak Moment” has been redefined from capturing and immortalizing memories on film to waking up the next day and seeing entire industries disappear.