Current Issue: Volume 20  7 October 2015

@ISACA is a biweekly publication available from this page and delivered via email to ISACA members and subscribers. This electronic newsletter feature timely industry and ISACA news, as well as featured and updates relevant our readers.

Tips From Industry Experts

By Jack Freund, Ph.D., CISA, CISM, CRISC

Projects are the vehicle by which new “stuff” is added into the business environment. It makes sense, then, that it is necessary to implement the equivalent of an import inspection service to ensure the security of the new things being bolted on or forklifted in to the operating environment. Read More >>


Security professionals are increasingly concerned with cloud technology and mobile devices as these areas transform the IT landscape and the way people work. This modified IT infrastructure presents numerous cybersecurity challenges, as attacks are more sophisticated than ever before. Read More >>


Cybersecurity and data security have become issues of national security for governments around the world. Attendees at the 2015 European Computer Audit, Control and Security (CACS) and Information Security and Risk Management (ISRM) Conference will have the opportunity to learn... Read More >>


Volunteers are critical to the success and continued growth of ISACA, and now it is more convenient than ever to share your expertise. To make ISACA more responsive and agile, the ISACA Board of Directors unanimously approved a new approach to engaging volunteers in a variety of activities. Read More >>


“Information security is a challenging field that needs to remain current with the latest technology trends in the industry. As a security consultant, the knowledge that the ISACA Journal and other ISACA publications provide is essential and valuable. Read More >>

Reviewed by Maria Patricia Prandini, CISA, CRISC

Few books on information technology can stand the test of time. As a field that is constantly evolving, what was proclaimed new technology a few years or months ago is outdated today. Information security publications are exposed to the same risk.