journal header

Volume 2, 2015

This Week's Online-Exclusive Feature

Book Review—The Fifth Domain: Wake Up Neo
18 February 2015
Reviewed by Ibe Etea, CISA, CRISC, CA, CFE, CIA, CRMA

The Fifth Domain: Wake Up Neo, written by two chief information officers (CIOs), is an innovative experiment with the cybertechnology novel and is worth the attention of information security professionals. The two authors have tinkered with contemporary reality and plausible fiction to raise the stakes in knowledge transfer, using a leisurely but effective way of sharing information while piquing readers’ interest in a highly technical field—the world of cybertechnology.

With the simplicity of a magazine article and a clearly defined purpose, the authors go about exploring key points about the scary, but real, nature of cyberthreats. Read More

Indicates Online-Exclusive Content



Podcast  New!
ISACA Journal Volume 1 Podcast:  Microwave Software

This Week's Featured Author Blog

Tips for Implementing a Secure Cloud System
3 March 2015

Cloud technology had a strong start because it followed the same development path as other systems. That path was to develop capabilities and add features to systems with little regard for information security. Over the years, cloud applications have emerged as software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). Cloud systems are deployed as private, community, public and hybrid models. They are all over the Internet and are accessible by many types of mobile devices.

Over time, many cloud systems have crashed and incurred a variety of problems. Because of this and the fact that many people are not paying attention to these issues I wrote my recent ISACA Journal article, “Cloud Insecurities.” In the article I talk about the threats, vulnerabilities and weaknesses that people have accepted as a way of life and tend to ignore. Many of the article’s observations come from reading the Department of Homeland Security (DHS) Daily Open Source Infrastructure Report and from the Cloud Security Alliance (CSA) reports. Read More

Indicates Online-Exclusive Content