News

To secure valuable data, organizations need to implement digital trust in software supply chains; however, several key ...
The paradigm of digital–physical systems, called cyber–physical systems (CPS) by ISO, has evolved significantly. CPS ...
The convergence of information technology (IT) and operational technology (OT) is rapidly changing the industrial landscape ...
Two of the most significant challenges in remote auditing are enabling key relationships and accessing information. But ...
What happens if weaknesses in an organization's monitoring and detection capabilities cloud visibility so severely that it has no idea how much risk it is truly absorbing?
The evolution of technology has transformed human–machine relationships, resulting in an unprecedented computing environment ...
Can organizations balance harnessing the value of data with protecting consumer privacy? What is the balance between the ...
Get involved in your professional community and expand your network through ISACA Engage. Engage offers many opportunities to get involved in ways that align with your time, talent, and interests.
Cyber Risk and Communicating to a Board of Directors Part I--Digital transformation has heightened due to the pandemic. We went from, “we can’t work from home” to “we can only work from home moving ...
Certified Information Security Manager (CISM) certification holders give advice to those considering becoming CISM certified.
Experience ISACA through our lens. Explore our educational content, ISACA news and events, in-depth interviews with experts in cybersecurity, IT audit, governance and so much more, plus a link to ...
A review of the quality audit process from what triggers an audit, what an audit entails, and what are the possible results of the audit.