General Auditing for IT Auditors
Danny M. Goldberg, CISA, CGEIT, CIA, CPA
This article focuses on the general (i.e., financial, controls and operational) audit process, where IT fits into this process and how to bring it all together.
Math on Malware
Henk-Jan van der Molen
The purpose of this article is to use the insights of network theory in the discussion of how the malware problem can be reduced.
Five Questions With...
Francisco Garcia Moran
Garcia Moran started his career as a teacher and IT engineer at the University of Seville (Spain).
Gan Subramaniam, CISA, CISM, CCNA, CCSA, CIA, CISSP, ISO 27001 LA, SSCP
How can we calculate the cost of security incidents, and is there any formula that is readily available and widely followed?
Who Pays for Security?
Steven J. Ross, CISA, CISSP, MBCP
Given a certain level of security over information resources in an organization, who is paying for it in any given organization?
Understanding and Applying Benford’s Law
Tommie W. Singleton, Ph.D., CISA, CGEIT, CITP, CPA
This article will attempt to describe what Benford’s Law is, when it could apply and what constraints to consider before applying it in an IT audit.
JOnline: Top IT Governance Issues of 2011
Larry Marks, CISA, CGEIT, CRISC, CFE, CISSP, PMP
This article seeks to identify a tentative list of the most prominent issues that are impacting stakeholders in the governance space in 2011.