News

To secure valuable data, organizations need to implement digital trust in software supply chains; however, several key ...
The paradigm of digital–physical systems, called cyber–physical systems (CPS) by ISO, has evolved significantly. CPS ...
The convergence of information technology (IT) and operational technology (OT) is rapidly changing the industrial landscape ...
Two of the most significant challenges in remote auditing are enabling key relationships and accessing information. But ...
What happens if weaknesses in an organization's monitoring and detection capabilities cloud visibility so severely that it has no idea how much risk it is truly absorbing?
The evolution of technology has transformed human–machine relationships, resulting in an unprecedented computing environment ...
Can organizations balance harnessing the value of data with protecting consumer privacy? What is the balance between the ...
Get involved in your professional community and expand your network through ISACA Engage. Engage offers many opportunities to get involved in ways that align with your time, talent, and interests.
Certified Information Security Manager (CISM) certification holders give advice to those considering becoming CISM certified.
A review of the quality audit process from what triggers an audit, what an audit entails, and what are the possible results of the audit.
This is intended to be a 2-part CMMI Tech Talk on CMMI Practice Area Managing Security Threats and Vulnerabilities (MST). Related Tech Talk- CMMI Tech Talk: CMMI Model Deep Dive: Managing Security ...
Review of the Process Quality Assurance (PQA) Practice Area. We will discuss the intent of this Practice Area and look at what value it can provide to an organization, as well as looking at the ...