No items have been added to your cart yet
Expand your knowledge on cloud environments, augmented reality, disruptive innovations, and much more.
Privilege in IT is like oil: The machine cannot run without it, but too much and there will be a mess. The industry has struggled with privilege over the years and...
Because incidents cause trouble and potential losses, there are processes such as business continuity management and disaster recovery planning...
I have been an IT professional for more than four decades, starting in the 1980s. So much has changed, yet so much has stayed the same or, more appropriately, returned to the same...
More than 20 years ago, virtual reality (VR) was a simple headset that communicated with video-game consoles and allowed humans to play video games viewed on a four-inch screen housed inside the headset...
For years, security teams have been tasked with supporting the shift to the cloud, all while maintaining the responsibility of securing on-premise infrastructure and assets...
Quantum computing has become one of the most interesting areas of research, training and investment, particularly in the IT-related business sector...
It does not matter whether it is Industry 4.0, a digital twin, the Internet of Machines, distributed system optimization in edge computing or just plain process digitization, digital transformation initiatives are about positively...
Artificial intelligence (AI) has come to the forefront of software technology and is presented as both a positive and negative influence on humanity....
In this Orwellian era, when opponents are enemies and enemies are co-conspirators, where news is falsified and trust is endangered, it has become well-nigh impossible to apply clear definitions to attackers...
It is no great secret that organizations are moving more and more applications into the cloud. In fact, a recent research study states that by 2021, 53 percent “of all IT and data processing requirements will be in the cloud...
While authoring this column and, indeed, participating in the Audit and Assurance community on ISACA’s Engage Online forum, my opinion is often sought on a wide range of audit-related topics from ISACA members...
“Deep fake” is a term derived from deep learning, and it refers to modifying or creating fake videos using human image synthesis and artificial intelligence (AI)...
The need for innovation in the IT assurance field is based on evolving requirements for which traditional responses have lagged behind. The ability to have an in-depth understanding of the organization and its changing environment and track its complex technology represents a challenge for IT auditors and IT assurance analysts.
Yahoo Inc. was fined a US$35 million penalty for failing to disclose one of the largest data breaches in the world, in which hackers captured the personal data of millions of user accounts. The failure to disclose the breach misled investors.
How can an organization make third parties comply with NIST?” This question haunts risk management professionals (and their lawyers) who are familiar with all five functions, 23 categories and 108 subcategories of the Cybersecurity Framework (CSF), published by the US National Institute of Standards and Technology (NIST).
Advanced persistent threats (APTs) were utilized to breach financial information, costing millions of US dollars during the recent Facebook, Capital One, Google Plus and Uber breaches...