Posts

  
View: 
EditBlogAuthorFilter
The Absence of IT Governance CodesUse SHIFT+ENTER to open the menu (new window).
Journal2207/17/2017 3:03 PMGovernment-Regulatory3 Approved
Steven De Haes, Ph.D., Anant Joshi, Ph.D., Tim Huygh and Salvi Jansen
72,017
Obtaining Accurate HTTPS Posture InformationUse SHIFT+ENTER to open the menu (new window).
Journal2207/3/2017 8:20 AMSecurity0 Approved
Kurt Kincaid, CISA, Lean Six Sigma Green Belt
72,017
Strengthening Risk Management in the Wake of Petya Ransomware OutbreakUse SHIFT+ENTER to open the menu (new window).
Journal2206/28/2017 2:17 PMRisk Management2 Approved
Ed Moyle
62,017
Using Hackers’ Own Tools Against Them Use SHIFT+ENTER to open the menu (new window).
Journal2206/26/2017 3:11 PMSecurity0 Approved
Danelle Au
62,017
Emotional Labor Use SHIFT+ENTER to open the menu (new window).
Journal2206/22/2017 3:05 PMAudit-Assurance0 Approved
Kamal Khan, CISA, CISSP, CITP, MBCS
62,017
The Key for Evaluating IT Asset, Risk Impact and Control GapUse SHIFT+ENTER to open the menu (new window).
Journal2206/19/2017 3:43 PMRisk Management0 Approved
Shemlse Gebremedhin Kassa, CISA, CEH
62,017
Leverage Enterprise Data Management Investments to Facilitate Data Breach Reporting RequirementsUse SHIFT+ENTER to open the menu (new window).
Journal2206/5/2017 8:17 AMGovernment-Regulatory0 Approved
Guy Pearce
62,017
Securing Connected DevicesUse SHIFT+ENTER to open the menu (new window).
Journal2205/15/2017 3:13 PMSecurity0 Approved
Hemant Patel, CISM, ITIL, PMP, TOGAF
52,017
Holistic View of Addressing IoT Risk by Leveraging a Decomposition StrategyUse SHIFT+ENTER to open the menu (new window).
Journal2205/8/2017 3:08 PMRisk Management0 Approved
Indrajit Atluri, CRISC, CISM, CEH, CISSP, CSSLP, HCISPP, ITILv3
52,017
Securing Mobile AppsUse SHIFT+ENTER to open the menu (new window).
Journal2205/1/2017 3:40 PM0 Approved
Sakthivel Rajendran, CISA, CRISC, CISM, CEH, GMOB
52,017
Agile Audit PracticeUse SHIFT+ENTER to open the menu (new window).
Journal2204/10/2017 3:07 PMAudit-Assurance1 Approved
Spiros Alexiou, Ph.D., CISA
42,017
How to Manage Third-party RiskUse SHIFT+ENTER to open the menu (new window).
Journal2204/3/2017 8:31 AMRisk Management1 Approved
Vasant Raval, DBA, CISA, ACMA, and Samir Shah, CISA, CA, CFE, CIA, CISSP
42,017
The Value of Risk ComparisonUse SHIFT+ENTER to open the menu (new window).
Journal2203/27/2017 3:10 PMRisk Management0 Approved
Mukul Pareek, CISA, ACA, ACMA, PRM
32,017
Going for the ATOUse SHIFT+ENTER to open the menu (new window).
Journal2203/13/2017 3:04 PMGovernment-Regulatory0 Approved
Jo Anna Bennerson, CISA, CGEIT, CPA, ITILv3, PMP
32,017
SSH: A Useful but Potentially Risky Tool Use SHIFT+ENTER to open the menu (new window).
Journal2202/27/2017 3:01 PMSecurity0 Approved
Tatu Ylonen
22,017
A Framework to Evaluate PAM ImplementationUse SHIFT+ENTER to open the menu (new window).
Journal2202/21/2017 9:11 AMRisk Management0 Approved
Richard Hoesl, CISSP, SCF, Martin Metz, CISA, Joachim Dold, Stefan Hartung
22,017
EU GDPR: Embracing Privacy RequirementsUse SHIFT+ENTER to open the menu (new window).
Journal2202/13/2017 3:11 PMGovernment-Regulatory0 Approved
Tarun Verma
22,017
The Risk Associated With AIUse SHIFT+ENTER to open the menu (new window).
Journal2202/6/2017 9:40 AMRisk Management3 Approved
Phillimon Zongo
22,017
Mitigating the Insider ThreatUse SHIFT+ENTER to open the menu (new window).
Journal2201/30/2017 3:06 PMRisk Management2 Approved
Rodney Piercy, CEH, CISSP
12,017
Dispelling Concerns Regarding Quantitative AnalysisUse SHIFT+ENTER to open the menu (new window).
Journal2201/23/2017 3:18 PMRisk Management1 Approved
Jack Jones, CISA, CRISC, CISM, CISSP
12,017
Governance and City DevelopmentUse SHIFT+ENTER to open the menu (new window).
Journal2201/17/2017 3:01 PMCOBIT-Governance of Enterprise IT 1 Approved
Graciela Braga, CGEIT, COBIT Foundation, CPA
12,017
Phishing Attacks: Organizations in Troubled Waters Year After Year?Use SHIFT+ENTER to open the menu (new window).
Journal2201/9/2017 4:02 PMRisk Management1 Approved
Baidyanath Biswas and Arunabha Mukhopadhyay, Ph.D.
12,017
The Decision to Adopt Machine Learning for Telemedicine Use SHIFT+ENTER to open the menu (new window).
Journal2201/2/2017 8:20 AMCOBIT-Governance of Enterprise IT 0 Approved
Shounak Pal and Arunabha Mukhopadhyay, Ph.D.
12,017
The Hexa-dimension Metric: Not Just for Data Privacy ProtectionUse SHIFT+ENTER to open the menu (new window).
Journal22012/29/2016 3:08 PMPrivacy0 Approved
Wanbil W. Lee, DBA, FBCS, FHKCS, FHKIE, FIMA
122,016
Ethics and Data Protection LawsUse SHIFT+ENTER to open the menu (new window).
Journal22012/29/2016 3:08 PMPrivacy0 Approved
Henry Chang, CISM, CIPT, CISSP, DBA, FBCS
122,016
The Keys to Using Analytic TechniquesUse SHIFT+ENTER to open the menu (new window).
Journal22011/14/2016 12:45 PMAudit-Assurance2 Approved
Spiros Alexiou, Ph.D, CISA
112,016
Follow-up to Ensure That All Is WellUse SHIFT+ENTER to open the menu (new window).
Journal22011/7/2016 11:07 AMAudit-Assurance0 Approved
Ian Cooke, CISA, CRISC, CGEIT, COBIT Foundation, CFE, CPTS, DipFM, ITIL Foundation, Six Sigma Green Belt
112,016
Conduct a More Accurate Risk AssessmentUse SHIFT+ENTER to open the menu (new window).
Journal22011/3/2016 3:03 PMRisk Management0 Approved
Venkatasubramanian Ramakrishnan, CRISC, CISM, CHFI
112,016
Reducing the Gender Disparity in Cyber SecurityUse SHIFT+ENTER to open the menu (new window).
Journal22010/24/2016 3:13 PM2 Approved
Daksha Bhasker, CISM, CISSP
102,016
Practical Considerations in Planning an Open-source Security Monitoring InfrastructureUse SHIFT+ENTER to open the menu (new window).
Journal22010/17/2016 3:13 PM0 Approved
Furkan Caliskan, CISA
102,016
Why Do IT Governance and Information Security Governance Practices Fail? Use SHIFT+ENTER to open the menu (new window).
Journal22010/10/2016 3:55 PM0 Approved
Yuri Bobbert, CISM, SCF and Hans Mulder, Ph.D.
102,016
Leveraging the NIST 800-53 ControlsUse SHIFT+ENTER to open the menu (new window).
Journal22010/3/2016 8:43 AM1 Approved
Craig R. Hollingsworth, CISA
102,016
Framework for Protecting Your Valuable IT AssetsUse SHIFT+ENTER to open the menu (new window).
Journal2209/26/2016 3:11 PM1 Approved
Shemlse Gebremedhin Kassa, CISA, MSCS
92,016
Move From Good to Great With These 7 Tips for Your Awareness ProgramUse SHIFT+ENTER to open the menu (new window).
Journal2209/19/2016 3:06 PM0 Approved
Tom Pendergast, Ph.D.
92,016
Simplified Audit ProgramsUse SHIFT+ENTER to open the menu (new window).
Journal2209/15/2016 3:03 PM4 Approved
Paul Phillips
92,016
Determining the Value of Cloud ComputingUse SHIFT+ENTER to open the menu (new window).
Journal2209/12/2016 3:07 PM0 Approved
Betsie Estes
92,016
Cybersecurity CostsUse SHIFT+ENTER to open the menu (new window).
Journal2209/6/2016 3:05 PM0 Approved
Stefan Beissel, Ph.D., CISA, CISSP, PMP
92,016
While You Are Away From HomeUse SHIFT+ENTER to open the menu (new window).
Journal2208/22/2016 3:44 PM0 Approved
Amgad Gamal, CISA, COBIT Foundation  CEH, CHFI, CISSP, ECSA, ISO 27000 LA, ISO 20000 Lead Practitioner, MCDBA, MCITP, MCP, MCSE, MCT, PRINCE2 Foundation/Practitioner
82,016
Is Maintaining Privacy an Uphill Battle?Use SHIFT+ENTER to open the menu (new window).
Journal2208/1/2016 8:07 AM1 Approved
C. Warren Axelrod, Ph.D., CISM, CISSP
82,016
Managing the Enterprise Mobile App Security EnvironmentUse SHIFT+ENTER to open the menu (new window).
Journal2207/25/2016 3:06 PM0 Approved
Mohammed J. Khan, CISA, CRISC, CIPM
72,016
Minimizing the Risk of Cloud AdoptionUse SHIFT+ENTER to open the menu (new window).
Journal2207/18/2016 3:02 PM0 Approved
Phil Zongo
72,016
SDN Concerns and BenefitsUse SHIFT+ENTER to open the menu (new window).
Journal2207/11/2016 3:04 PM0 Approved
Nikesh Dubey, CISA, CISM, CRISC, CCISO, CISSP
72,016
Personal Information on Your Mobile DevicesUse SHIFT+ENTER to open the menu (new window).
Journal2207/5/2016 7:44 AM0 Approved
Larry G. Wlosinski, CISA, CISM, CRISC, CAP, CBCP, CCSP, CDP, CISSP, ITIL v3
72,016
Social Learning and Security AwarenessUse SHIFT+ENTER to open the menu (new window).
Journal2206/20/2016 3:06 PM0 Approved
Kerry A. Anderson, CISA, CISM, CGEIT, CRISC, CCSK, CFE, CISSP, CSSLP, ISSAP, ISSMP
62,016
Preparing for a Black SwanUse SHIFT+ENTER to open the menu (new window).
Journal2206/6/2016 8:23 AM0 Approved
Mustafa S. Poonawala, CISA, ITIL
62,016
The Necessity of SoDUse SHIFT+ENTER to open the menu (new window).
Journal2205/31/2016 3:15 PM0 Approved
Stefano Ferroni, CISM, ISO 27001 LA, ITIL Expert
52,016
The Role of CIOs and CISOsUse SHIFT+ENTER to open the menu (new window).
Journal2205/23/2016 3:11 PM0 Approved
Devassy Jose Tharakan, CISA, ISO 27001 LA, ITIL, PMP
52,016
Regulatory Management and Measurement RulesUse SHIFT+ENTER to open the menu (new window).
Journal2205/16/2016 3:23 PM0 Approved
Simon Grima, Ph.D., Robert W. Klein, Ph.D., Ronald Zhao, Ph.D., Frank Bezzina, Ph.D., Pascal Lélé, Ph.D.
52,016
Elliptical Curve Cryptography for the Internet of ThingsUse SHIFT+ENTER to open the menu (new window).
Journal2205/9/2016 3:02 PM0 Approved
Veronika Stolbikova
52,016
The Benefits of Effective SIEM Policy DevelopmentUse SHIFT+ENTER to open the menu (new window).
Journal2205/2/2016 9:46 AM0 Approved
Aleksandr Kuznetcov, CISM
52,016
Experiences During Government-mandated AuditsUse SHIFT+ENTER to open the menu (new window).
Journal2204/28/2016 3:02 PM0 Approved
Jeroen van Lewe, CISA, CEH, CIA, ECSA
42,016
Board Involvement With IT GovernanceUse SHIFT+ENTER to open the menu (new window).
Journal2204/25/2016 3:15 PM1 Approved
Nancy Lankton, CISA, CPA, and Jean Price
42,016
Effective Data VisualizationUse SHIFT+ENTER to open the menu (new window).
Journal2204/21/2016 4:15 PM0 Approved
Karina Korpela, CISA, CISM, CISSP, PMP
42,016
Is Cybersecurity Everyone's Concern?Use SHIFT+ENTER to open the menu (new window).
Journal2204/18/2016 3:06 PM2 Approved
Sanjiv Agarwala, CISA, CISM, CGEIT, BS25999/ISO 22301 LA, CISSP, ISO 27001:2013 LA, MBCI
42,016
Using Technology for Right or WrongUse SHIFT+ENTER to open the menu (new window).
Journal2204/11/2016 3:08 PM0 Approved
Vasant Raval, DBA, CISA, ACMA
42,016
A Practical Assessment of Application Security Risk Use SHIFT+ENTER to open the menu (new window).
Journal2204/4/2016 8:41 AM0 Approved
Shubhamangala B.R. and Snehanshu Saha, Ph.D.
42,016
A Nontraditional Approach to Prioritizing and Justifying Cybersecurity InvestmentsUse SHIFT+ENTER to open the menu (new window).
Journal2203/28/2016 3:01 PM0 Approved
Robert Putrus, CISM, CFE, CMC, PE, PMP
32,016
Evaluating Risk by Knowing “What” and “Why”Use SHIFT+ENTER to open the menu (new window).
Journal2203/21/2016 8:33 AM0 Approved
Alan Moran, Ph.D., CITP, CRISC
32,016
Differentiating and Understanding the Benefits of Using, Frameworks, Methodologies, Process, Tools and TechniquesUse SHIFT+ENTER to open the menu (new window).
Journal2203/14/2016 3:05 PM0 Approved
Laurent Renard, CISA, CISM, CGEIT, CRISC, COBIT Foundation, DevOps, GRCP, ITIL Expert, Lean Six Sigma BB, MoP, MSP, P3O, PMIACP, PMI-PBA, PMP, PRINCE2, Resilia, Scrum PSM-PSPO, TOGAF
32,016
Leveraging Lean to Improve Software EngineeringUse SHIFT+ENTER to open the menu (new window).
Journal2203/7/2016 8:27 AM0 Approved
Vimal Mani, CISA, CICA, Six Sigma Black Belt
32,016
The Role of IT in Mergers and AcquisitionsUse SHIFT+ENTER to open the menu (new window).
Journal2202/29/2016 3:04 PM0 Approved
Deepak Khazanchi, Ph.D.
22,016
Protecting Your Organization’s Most Valuable Asset—InformationUse SHIFT+ENTER to open the menu (new window).
Journal2202/15/2016 3:16 PM0 Approved
Frederick G. Mackaden, CISA, CMA, PMP
22,016
When It Comes to Changing IA, Do Not Let Perfection Be the Enemy of the Good EnoughUse SHIFT+ENTER to open the menu (new window).
Journal2202/8/2016 3:09 PM2 Approved
Bob Kress
22,016
Using the COBIT 5 Assessment Programme to Improve the Work Process Capability of Auditors, Assurance Professionals and AssessorsUse SHIFT+ENTER to open the menu (new window).
Journal2202/1/2016 8:29 AM0 Approved
Graciela Braga, CGEIT, COBIT Foundation, CPA
22,016
Going Beyond an Audit ChecklistUse SHIFT+ENTER to open the menu (new window).
Journal2201/25/2016 3:04 PM3 Approved
Sanjiv Agarwala, CISA, CISM, CGEIT, CISSP
12,016
Audit Universe and the IT Risk Assessment ProcessUse SHIFT+ENTER to open the menu (new window).
Journal2201/19/2016 3:11 PM0 Approved
Mohammed J. Khan, CISA, CRISC, CIPM
12,016
Visualization: Inherent or Learned?Use SHIFT+ENTER to open the menu (new window).
Journal2201/11/2016 3:24 PM2 Approved
Karina Korpela, CISA, CISM, CISSP, PMP
12,016
How Big Are Your Data?Use SHIFT+ENTER to open the menu (new window).
Journal2201/4/2016 8:39 AM0 Approved
C. Warren Axelrod, Ph.D., CISM, CISSP
12,016
Internet of Things: Evolution or Revolution of Technology?Use SHIFT+ENTER to open the menu (new window).
Journal22011/23/2015 3:02 PM0 Approved
Jim Seaman, CISM, CRISC
112,015
Toward a Common Understanding of CybersecurityUse SHIFT+ENTER to open the menu (new window).
Journal22011/16/2015 3:06 PM0 Approved
Deepak Rout, CISM, CRISC, CISSP
112,015
Managing Changes in Risk ManagementUse SHIFT+ENTER to open the menu (new window).
Journal22011/9/2015 3:11 PM0 Approved
Mette Brottmann, Klaus Agnoletti, Morten Als Pedersen, Ronnie Lykke Madsen, Michael Rosendal Krumbak and Thor Ahrends, CISA, CISM, CRISC
112,015
From Problem to Ethical SolutionUse SHIFT+ENTER to open the menu (new window).
Journal22011/2/2015 9:01 AM0 Approved
Wanbil W. Lee, DBA
112,015
Understanding Cyberhacking Tools and Techniques Use SHIFT+ENTER to open the menu (new window).
Journal22010/5/2015 9:01 AM1 Approved
Omar Y. Sharkasi, CBCP, CFE, CRP
102,015
Cyberrecovery and the C-suiteUse SHIFT+ENTER to open the menu (new window).
Journal2209/28/2015 3:10 PM0 Approved
Gary Lieberman, Ph.D., CISSP
92,015
Mitigating the Quantum Risk to CybersecurityUse SHIFT+ENTER to open the menu (new window).
Journal2209/21/2015 3:38 PM0 Approved
Michele Mosca, Ph.D.
92,015
How to Battle Hackers on an Even Plane Use SHIFT+ENTER to open the menu (new window).
Journal2209/14/2015 3:03 PM8 Approved
Chris Sullivan
92,015
Understanding Underground CybercrimeUse SHIFT+ENTER to open the menu (new window).
Journal2209/8/2015 8:22 AM0 Approved
Larry G. Wlosinski, CISA, CISM, CRISC, CAP, CBCP, CDP, CISSP, ITIL V3
92,015
The Necessary Prerequisite When Moving to the CloudUse SHIFT+ENTER to open the menu (new window).
Journal2208/3/2015 3:04 PM0 Approved
Corey Eng
82,015
The Need for Auditing Linux Operating Systems: A Practical ApproachUse SHIFT+ENTER to open the menu (new window).
Journal2207/27/2015 3:06 PM1 Approved
Muhammad Mushfiqur Rahman, CISA, CEH, CHFI, CCNA, ISO 27001 LA, ITIL V3, MCITP, MCP, MCSE, MCTS, OCP, SCSA
72,015
Third-party Product Insecurity Is Costing YouUse SHIFT+ENTER to open the menu (new window).
Journal2207/20/2015 3:00 PM0 Approved
Rohit Sethi, CISSP, CSSLP, and Ehsan Foroughi, CISM, CISSP
72,015
Addressing Vendor Security RiskUse SHIFT+ENTER to open the menu (new window).
Journal2207/13/2015 9:27 AM3 Approved
Dipti Patel, CISA, CISM, ISO 27001 LA, ITIL V3
72,015
Managing a Global Team in the Compliance WorldUse SHIFT+ENTER to open the menu (new window).
Journal2207/6/2015 8:14 AM0 Approved
Mohammed J. Khan, CISA, CRISC, CIPM
72,015
Monitoring, Analysis and Incident Management for Secure Data CentersUse SHIFT+ENTER to open the menu (new window).
Journal2206/22/2015 3:08 PM0 Approved
Brett van Niekerk, Ph.D., and Pierre Jacobs
62,015
Examining the Adoption of COBIT 5Use SHIFT+ENTER to open the menu (new window).
Journal2206/15/2015 3:10 PM0 Approved
Makoto Miyazaki, CISA, CPA
62,015
Using COBIT to Unlock the Value of Knowledge ManagementUse SHIFT+ENTER to open the menu (new window).
Journal2206/8/2015 3:16 PM0 Approved
Bostjan Delak, Ph.D., CISA, CIS
62,015
Automation in Security TestingUse SHIFT+ENTER to open the menu (new window).
Journal2206/1/2015 7:22 AM1 Approved
Sivarama Subramanian, CISM
62,015
Develop Sustainable Business Practices with COBIT 5Use SHIFT+ENTER to open the menu (new window).
Journal2205/26/2015 3:10 PM2 Approved
Graciela Braga, CGEIT, COBIT 5 Foundation, CPA
52,015
APT and Social Engineering: With New Threats Come New Assessment MethodologiesUse SHIFT+ENTER to open the menu (new window).
Journal2205/18/2015 3:04 PM0 Approved
Roberto Puricelli, CISM
52,015
The Limits of RulesUse SHIFT+ENTER to open the menu (new window).
Journal2205/11/2015 3:06 PM0 Approved
By Vasant Raval, DBA, CISA, ACMA
52,015
Process Automation for Better GovernanceUse SHIFT+ENTER to open the menu (new window).
Journal2205/4/2015 8:27 AM0 Approved
Andrew Evers
52,015
Building a Holistic IT Security PolicyUse SHIFT+ENTER to open the menu (new window).
Journal2204/27/2015 9:40 AM4 Approved
Mauricio Rocha Lyra, Ph.D., COBIT Foundation, CTFL, ISO 20000, ITIL, MCSO, OCUP, PMP, RUP and Jose Carlos Ferrer Simoes
42,015
Evaluating E-health Governance FrameworksUse SHIFT+ENTER to open the menu (new window).
Journal2204/20/2015 3:20 PM0 Approved
Elena Beratarbide, Ph.D., CISA
42,015
ERP Implementation in the Education Sector: Using a Hybrid IT Governance FrameworkUse SHIFT+ENTER to open the menu (new window).
Journal2204/13/2015 3:11 PM0 Approved
Manas Tripathi and Arunabha Mukhopadhyay, Ph.D.
42,015
Implementing Continuous Control MonitoringUse SHIFT+ENTER to open the menu (new window).
Journal2204/6/2015 8:49 AM1 Approved
David Vohradsky, CGEIT, CRISC
42,015
Staying Secure in the IoTUse SHIFT+ENTER to open the menu (new window).
Journal2203/30/2015 3:22 PMSecurity0 Approved
Marcelo Hector Gonzalez, CISA, CRISC, and Jana Djurica
32,015
Preventing Cyberattacks With COBIT 5 ProcessesUse SHIFT+ENTER to open the menu (new window).
Journal2203/22/2015 3:01 PMSecurity0 Approved
Fredric Greene, CISSP
32,015
A Security Solution Needs to Fit Like a Great SuitUse SHIFT+ENTER to open the menu (new window).
Journal2203/9/2015 3:08 PMSecurity0 Approved
Kerry A. Anderson, CISA, CISM, CGEIT, CRISC, CCSK, CFE, CISSP, CSSLP, ISSAP, ISSMP
32,015
Tips for Implementing a Secure Cloud SystemUse SHIFT+ENTER to open the menu (new window).
Journal2203/2/2015 7:59 AMSecurity0 Approved
Larry Wlosinski CISA, CISM, CRISC, CAP, CBCP, CDP, CISSP, ITIL V3
32,015
Applying Porter’s 5 Forces Model to Risk and SecurityUse SHIFT+ENTER to open the menu (new window).
Journal2202/9/2015 3:08 PMRisk Management0 Approved
Yuri Bobbert
22,015
A Smart Strategy to Combat Advanced Persistent Threats and Targeted AttacksUse SHIFT+ENTER to open the menu (new window).
Journal2202/2/2015 8:45 AMSecurity0 Approved
22,015
1 - 100 Next