Leveraging the Cloud for Added Value
Steven C. Markey
IS professionals must be ready to articulate the pros and cons of this new environment, and where and how it can provide added value for the business.
Preparing for HTML5 Capabilities and Threats
Compared with previous versions, HTML5 is a safer and more effective tool for delivering today’s rich web content; however, it also introduces several security risk factors.
The Changing Face of Cybersecurity
Stewart Hayes, Malcolm Shore and Miles Jakeman, Ph.D.
The Internet has a well-earned reputation as a hostile environment, and the growth of organised cybercrime is evidence that there is not enough being done to manage the risk.
Five Questions With...
Brian Schaeffer, CISA, CISSP
Brian Schaeffer, CISA, CISSP, is senior vice president and chief information officer (CIO) at Liberty Bell Bank.
Gan Subramaniam, CISA, CISM, CCNA, CCSA, CIA, CISSP, ISO 27001 LA, SSCP
What are the subcontrols that I must consider and evaluate to assess the effectiveness of the system and the appropriateness of the access privileges granted?
Risk and Responsibility
Vasant Raval, DBA, CISA
If we agree that in our profession, a primary concern is risk assessment and risk management, it is imperative that we comprehend the fundamental nature of risk.
The Cost of Cyberattacks
Steven J. Ross, CISA, CISSP, MBCP
From a purely financial standpoint, what would a widespread cyberattack look like should it be broadly targeted on the economy of an entire nation?
JOnline: Security Metrics—A Beginner’s Guide
Caroline Wong | Reviewed by Upesh Parekh, CISA
Security metrics are important not only for claiming the optimum share of IT budget, but also for creating security awareness across the company and improving the overall security posture of the organization.