Book Review: Using Social Media for Global Security
Ravi Gupta and Hugh Brooks | Reviewed by Joyce Chua, CISA, CISM, CITPM, ITIL, PMP
The rapid development of appealing new social applications has created a large audience for these services over the past few years.
The discussion around bring your own device (BYOD) policies is often focused on topics such as the opportunity, risk and security implications of using personal devices and user apps in the business context.
Manage What Is Known and What Is Not Known
Zhiwei Fu, Ph.D., CISA, CGEIT, CRISC, CFE, PMP, John W. Lainhart IV, CISA, CISM, CGEIT, CRISC, CIPP/G, CIPP/US, and Alan Stubbs, MAS
Fraud is an undeniable reality and has recently become more pervasive and persistent as a result of the downturn in the economy.
Privacy Assurance for BYOD
Ashwin Chaudhary, CISA, CISM, CGEIT, CRISC, CISSP, CPA, PMP
Mobile computing and the bring your own device (BYOD) trend are revolutionizing end-user computing in many organizations.
The Price of Mobility
William Emmanuel Yu, Ph.D., CISM, CRISC, CISSP, CSSLP
As enterprises attempt to determine the best ways of handling today’s bring your own device (BYOD) trends, they also realize the potential for mobilizing their existing enterprise systems and applications.
The Value of Big Data Analytics to the Business
Biswajit Mohapatra, Vinay Parisa and Joydipto Banerjee
The convergence of social, mobile, analytics and cloud (SMAC) has created a significant change in the value that enterprise applications can provide to business.
Vasant Raval, DBA, CISA, ACMA
Intentional actions of any code are essentially limited only to the extent its writer chooses.
Steven J. Ross, CISA, CISSP, MBCP
“CERT,” in the context of information security, is a term with a long and noble pedigree.
Thomas Borton, CISA, CISM, CRISC, CISSP
Get to know your network.