Current Issue: Volume 15  29 July 2015

@ISACA is a biweekly publication available from this page and delivered via email to ISACA members and subscribers. This electronic newsletter feature timely industry and ISACA news, as well as featured and updates relevant our readers.

Tips From Industry Experts

By Lisa Young, CISA, CISM

With the increase in outsourcing services and cloud computing use, third-party suppliers and vendors are taking on increasingly fundamental roles in the operation of organizations.


As a member of ISACA, you receive significant discounts on all resources available within the ISACA bookstore including ISACA exam review materials, results from the latest industry research projects and more. Read More >>


From businesses to government agencies, nearly every entity contracts some aspect of software development, system integration and hosting services, creating an emerging crisis in accountability. Read More >>

Reviewed by Ibe Etea, CISA, CRISC, CA, CFE, CIA, CRMA

Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady covers the subject of social engineering adequately and succinctly. The book takes a no-nonsense approach to the topic and delves into aspects of social engineering that are missed in other books on this speedily evolving, but critical, aspect of the information age.