@ISACA is a biweekly publication available from this page and delivered via email to ISACA members and subscribers. This electronic newsletter features timely industry and ISACA news, as well as features and updates relevant to our readers.
Tips From Industry Experts
 |
By Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
Managing IT is a fairly complicated task due to its complexity. Complexity arises due to the need to use various products from different vendors to meet ever-evolving business requirements. Similarly, managing security is as complex as managing IT, if not more so, due to the Internet enabling various different paradigms of enabling technology to meet business requirements better. Read More >> |
 |
ISACA News
New technologies have allowed more opportunities to access and misuse sensitive information. Even with new laws and regulations in place to safeguard data, new data privacy and compliance challenges have emerged. Read More >> |
ISACA News
It only takes 1 uninformed employee to open an email with a link to a phishing website for malicious actors to bypass your organization’s security. Each year, the number of phishing attacks is rising, so what can you do to keep your organization safe? Read More >>
ISACA News
Cybersecurity becomes more and more important in the face of the rising number of cyberattacks. Chief information security officers (CISOs) have had to redefine their roles and sharpen their skills to combat the danger of sensitive data leaks. Read More >>
ISACA News
The Cybersecurity Nexus™ (CSX) Virtual Cyber Academy is a comprehensive, real-world training solution that tests your skills in a live, dynamic network environment on a cloud-based learning platform. This means you can access your training any time of the day in any part of the world. Read More >>
 |
ISACA News
More personal data are available to enterprises than ever before due to the rise of automation, the Internet of Things (IoT) and artificial intelligence (AI). The increased availability of personal data results in an increased data protection risk for the enterprise. And, as more data privacy laws and regulations are instated, compliance becomes even more challenging and critical for enterprises. Read More >> |