Blogs 

ISACA Now Blog

ISACA Journal Author Blog

A medium for ISACA leaders, constituents and staff to discuss topics relevant to the association, the business environment and/or the profession, the ISACA Now blog provides you an opportunity to share and grow in your profession and the ISACA community. We invite you to participate by reading and responding to the posts included here.  The ISACA Journal author blog is intended to provide a vehicle for Journal authors, constituents and staff to exchange information of interest pertinent to Journal article topics, the business environment and/or the profession. We invite you to participate by reading and responding to the posts included here.

ISACA BLOG

Journal BLOG

Community Blogs

Find out what everyone is talking about. Visit your fellow member blogs.

Hello

My 1st Post of hopefully many.  While I started in Cybersecurity the summer of 2018, I have been in...

Frank242 @ 4/4/2019 5:54 PM | Comments (0)

Improving gender diversity

That is just how I see ithttps://insight.nttsecurity.com/post/102fhoh/improving-gender-diversity-in...

Thomas797 @ 4/4/2019 10:25 AM | Comments (0)

Crowdsourcing Compliance: Managing customer audits at scale

Bug Bounty programs and crowdsourced penetration testing platforms have already influenced security...

CraigerGRC @ 4/3/2019 11:55 AM | Comments (0)

Security landscape controls

Cybercrime is now a hot topic in the security industryCybercrime has moved from being the purview o...

Sanjib @ 3/28/2019 5:42 AM | Comments (0)

How I Passed ISACA CRISC

"The CRISC certification prepares and enables IT professionals for the unique challenges of IT...

Adham @ 3/24/2019 5:03 AM | Comments (1)

Auditoría Forense

La auditoría forense.Las crisis en nuestros tiempos provocan que personas se vean con la necesidad ...

Claudia Lisbeth @ 3/22/2019 11:44 AM | Comments (0)

Introduction

Hello everyone,This post is written for several purposes:1) Get information on how much CISA is in ...

Iskender808 @ 2/18/2019 4:41 AM | Comments (0)

Recovery terms

I try to visualize the various terms of the domain recovery. Here is what I have:

Karoly Arnhoffer @ 1/23/2019 7:09 AM | Comments (0)

How I would perform, Security Risk Management Assessment within an Organisation

Scenario – Say I have been appointed as an Information Security analyst or Cyber Risk Analyst for a...

Prince143 @ 1/17/2019 8:03 AM | Comments (1)

FACTOREES DE DISEÑO EN COBIT 2019

Una de las contribuciones más importantes en COBIT 2019 son los factores de diseño, los cuales dete...

Alejandro906 @ 1/16/2019 8:57 PM | Comments (0)

Employees Reducing The Risk of Insider Threats

Our greatest vulnerability with regard to a potential accidental insider cyber-attack resides with ...

Robert658 @ 6/6/2016 2:48 PM | Comments (2)

Esfuerzo ISACA Santo Domingo

Evidenciados los logros obtenidos y el alto nivel de apoyo recibido de centenares de personas (prof...

emorro @ 3/31/2011 12:04 PM | Comments (10)

Can My Data Be Held For Ransom?

Ransomware is a form of malware and is engineered to infect your personal computer and restrict acc...

Robert658 @ 6/10/2016 10:34 AM | Comments (2)

How to Get Less Findings on Your Next Internal Penetration Test

and Become More SecureAs a penetration tester I find it TOO EASY to fully compromise an internal ne...

Stewart141 @ 10/14/2014 10:27 AM | Comments (0)

Phishing News

Today, there are many ways criminals attack a company with phishing emails containing malware. Belo...

Robert658 @ 10/31/2017 8:19 AM | Comments (0)

Welcome

G'day and welcome to the blog of the Canberra Chapter. We have decided to update our concept of a c...

Rob Hanson @ 5/28/2014 8:02 PM | Comments (2)

ISACA Iraq Workshop

We are happy to announce that  on Feb//2018  the ISACA awareness session  was held in Baghdad.This ...

Ali099 @ 2/2/2018 8:15 PM | Comments (2)

Have you experienced ransomware attack so far?

Have you experienced ransomware attack so far and, if yes, what did you do to resolve?I set up Twit...

Dragan Pleskonjic @ 1/17/2018 7:38 AM | Comments (5)

PCI Compliance Wiki

For those new to PCI Compliance (either a new QSA or other interested party) I have put together a ...

Stewart141 @ 10/14/2014 10:48 AM | Comments (0)

PCI Segmentation...Why is it so hard!

I've started two recent PCI DSS Audits over the last few weeks and both clients have not had an ade...

Stewart141 @ 10/31/2014 11:42 AM | Comments (0)