Validating IoT Device Risks vs Business Value
Businesses must evaluate the potential risks as well as potential business value of IoT (Internet of Things) devices. ISACA explains how to get started.
Will Quantum Computing Break the Internet?
“What could cause a digital Armageddon?” My answer: Quantum computing — which may someday break the cryptography that protects the Internet.
Measuring Cyber Resilience – A Rising Tide Raises All Ships
Building cyber resilience requires you to qualitatively and quantitatively measure the capabilities of an enterprise.
NIST Password Guidance Should Be Well-Received
While NIST’s recent password guidance figures to be well-received, raising awareness about the security guidance is the short-term challenge.
Cybersecurity Workforce Development: 5 Takeaways From a NIST Workshop
A NIST workshop on Cybersecurity Workforce Development reveals these five trends. In response, here’s how the ISACA will enable cyber solutions.
Mobile Computing: Increasing Productivity and Cyber Risk
IT auditors must assess the state of mobile computing across governance, remote access, data loss, malware, incident response and more.
Increased Cyber Awareness Must Trigger Equivalent Action
Recent and widely publicized cyber attacks must drive a renewed, more concerted and coordinated global commitment to strengthen cyber security capabilities.
Getting Smarter About Making Cities Smart
Every city is modernizing infrastructure services (public transportation, utilities, health care) by leveraging technology & law enforcement in smart ways.
Job Boards, Social Media Networking Sites Can Set Cyber Attacks in Motion
Hackers & attackers perform reconnaissance on Websites, forums, job boards, and social networking sites like LinkedIn, Facebook & Twitter. Here’s how.