Where networking and knowledge intersect.
This award-winning bimonthly publication delivers practical, professional knowledge through peer-reviewed articles focused on topics critical to IT audit, governance, security and risk professionals.
The ISACA Journal App is now available for Android devices and the Kindle Fire, in addition to Apple devices. Visit your device’s marketplace and search “ISACA Journal” to download the free app from your Android smartphone, Kindle Fire, iPhone or iPad.
Based on Volume 3, 2014
Jonathan Copley, CISA and Upesh Parekh, CISA
A resilient service is one that is capable of withstanding major and minor disruptions caused by natural and man-made sources.
The discussion around bring your own device (BYOD) policies is often focused on topics such as the opportunity, risk and security implications of using personal devices and user apps in the business context.
Bruce Schneier | Reviewed by Maria Patricia Prandini, CISA, CRISC
It is almost guaranteed that readers interested in up-to-date information security facts will find at least one thing in this publication that will grab their attention.
Steven J. Ross, CISA, CISSP, MBCP
“CERT,” in the context of information security, is a term with a long and noble pedigree.
Full Editorial Calendar >>
Information Security MattersInformation EthicsIS Audit BasicsCloud ComputingFive Questions With...HelpSource Q&ACPE QuizCrossword Puzzle
In our recent Journal article, we talk about how enterprises are adopting technologies like cloud, analytics, social and mobile tools to drive a strategic advantage. Emerging businesses that are bor...
Members receive a subscription to the
التقنيات غير الكاملة والسلامة الرقمية
ثمن حرية التنقّل
Использование метрик для поддержки инноваций в бизнесе
Упрощенный подход к разделению обязанностей для совершенствования руководства ИТ