News

Can organizations balance harnessing the value of data with protecting consumer privacy? What is the balance between the ...
AI is reshaping the future. ISACA can help you stay ahead of the curve. Artificial Intelligence. What was once an ambitious concept is now a growing reality in the way we live and work. At ISACA, our ...
AI auditing needs leaders. Become one. ISACA ®, the leader in IT audit, introduces the first advanced audit-specific artificial intelligence certification designed for experienced auditors: the ISACA ...
The removal of end-to-end encryption in the United Kingdom is problematic. Additionally, governments appear to have conflicting attitudes toward privacy, which ultimately can lead to the erosion of ...
Having reliable metrics or key performance indicators (KPIs) in the field of information security is a prerequisite to building a successful security program. Measuring operational efficiency, costs ...
No matter the size of an organization, every organization that depends on information technology to conduct any part of its business should have a functioning cybersecurity program. Over the last ...
Author: Andre Pitkowski, CRISC, CGEIT, COBIT Foundation Trainer, CRMA, ISO 27001 LA, ISO 31000 LA, OCTAVE, Scrum PSM, and Daniel Bispo de Jesus, COBIT 5 Foundation, BCMF, DPO, ISO 27001 IA, ISO 27001 ...
These days, cyberadversaries are coming up with different kinds of capabilities and objectives behind each of their new cyberattacks, which has forced organizations to do a deeper, more introspective ...
COVID-19 imposed change on every aspect of life and business in 2020, but 2020 was also a significant year in the world of privacy protection for reasons beyond the pandemic. In 2020, enforcement of ...
In 2016, the cybersecurity world was abuzz due to the Bangladesh Bank cyberheist. It played out like a scene from a Hollywood blockbuster—a team of highly skilled hackers orchestrated a massive heist ...
The data center is the central nervous system for any organization. As the hub of servers that host business-critical data, the data center needs special attention. There are some basic checks ...
With sensitive data residing everywhere and the breach epidemic growing, the need for advanced data security solutions has become even more critical. Compliance with regulations such as the EU General ...