No items have been added to your cart yet
Read the ISACA杂志 to gain practical insights on technical topics from your peers.
Organizations grant network access nearly every minute of every day. Hackers frequently try to get inside networks using co-opted access credentials. Yet most IT departments still review access privileges only quarterly or semiannually.
Addressing 网络安全 Vulnerabilities. 10 areas of improvement to help security professionals detect, 预防和处理安全事件.
As organizations enter the international context and leverage their IT operations, 它们的可见度增加了.
Detective controls are a key component of a cybersecurity program in providing visibility into malicious activity and attacks on an organization’s IT environment.
Most people probably lock their doors when they are not at home. They trust that the things they value—family photographs.
There are many steps that can be taken to avoid a cyberbreach, 但从统计学上讲, the odds are that every company has been or will be breached at some point.
According to the Symantec Internet Security Threat Report (ISTR), the annual cost of cybercrime to consumers in the US is more than US $38 billion. Visit this article for more information.
How do I ensure that my organization has controls to protect itself from cyberrisk? 换句话说, what are the key controls that my company must implement to protect itself from cyberrisk?
My honest thought about monitoring is: I do not like being monitored! 我并不孤单. A large majority of individuals and organizations would assert that they do not like being monitored.
Stanley Baldwin was a British politician who won numerous national elections in the 1920s and 1930s.
Large software projects have been notorious because of: Their large budget and timescale overruns, Failing to deliver the promised benefits and more!
What has been, or do you anticipate being, the biggest compliance challenge in 2015?
Those who peruse this book can gain a clear understanding of how the establishment of the right processes, organization and technologies can guarantee the accomplishment of corporate governance goals.
This three-part series within the IS Audit Basics column continues a discussion on a matter that, 多年来, has been of concern to business managers everywhere.
美国前总统约翰. Kennedy said, “The Chinese use two brush strokes to write the word ‘crisis.’ One brush stroke stands for danger; the other for opportunity. In a crisis, be aware of the danger, but recognize the opportunity.”
Corporate entities and retailers are scrambling to shore up network security by addressing the primary vulnerability of network security: the login. Unique behavioral biometrics may be the solution.