Posts

  
View: 
The Darkest Moments of a Cybereclipse Are Best Examined Through a Quantitative LensJournal22010/16/2017 3:06 PMRisk Management0
Why Privacy by Design Is a Stride Toward Consumercentric DesignJournal22010/9/2017 3:05 PMPrivacy0
Examining the “Compliant, Yet Breached” PhenomenonJournal22010/2/2017 8:53 AMSecurity2
The Future Looks Promising for Blockchain Technology Journal2209/25/2017 3:14 PMSecurity0
SSH: Why You Need to CareJournal2209/21/2017 3:02 PMSecurity0
Tracking Vulnerability Fixes to ProductionJournal2209/18/2017 1:53 PMSecurity0
Equifax: Too Soon for Lessons Learned?Journal2209/8/2017 2:54 PMSecurity1
Stuck in the Middle With YouJournal2209/5/2017 8:51 AMAudit-Assurance0
ESA: What Is It and How Does it Work?Journal2208/28/2017 3:48 PMSecurity4
Developing an Information Privacy PlanJournal2208/14/2017 3:13 PMPrivacy0
Questions to Ask When Selecting an ITIL Automation ToolJournal2207/24/2017 3:26 PMSecurity0
The Absence of IT Governance CodesJournal2207/17/2017 3:03 PMGovernment-Regulatory3
Obtaining Accurate HTTPS Posture InformationJournal2207/3/2017 8:20 AMSecurity0
Strengthening Risk Management in the Wake of Petya Ransomware OutbreakJournal2206/28/2017 2:17 PMRisk Management2
Using Hackers’ Own Tools Against Them Journal2206/26/2017 3:11 PMSecurity0
Emotional Labor Journal2206/22/2017 3:05 PMAudit-Assurance0
The Key for Evaluating IT Asset, Risk Impact and Control GapJournal2206/19/2017 3:43 PMRisk Management0
Leverage Enterprise Data Management Investments to Facilitate Data Breach Reporting RequirementsJournal2206/5/2017 8:17 AMGovernment-Regulatory0
Securing Connected DevicesJournal2205/15/2017 3:13 PMSecurity0
Holistic View of Addressing IoT Risk by Leveraging a Decomposition StrategyJournal2205/8/2017 3:08 PMRisk Management0
Securing Mobile AppsJournal2205/1/2017 3:40 PM0
Agile Audit PracticeJournal2204/10/2017 3:07 PMAudit-Assurance1
How to Manage Third-party RiskJournal2204/3/2017 8:31 AMRisk Management1
The Value of Risk ComparisonJournal2203/27/2017 3:10 PMRisk Management0
Going for the ATOJournal2203/13/2017 3:04 PMGovernment-Regulatory0
SSH: A Useful but Potentially Risky Tool Journal2202/27/2017 3:01 PMSecurity0
A Framework to Evaluate PAM ImplementationJournal2202/21/2017 9:11 AMRisk Management0
EU GDPR: Embracing Privacy RequirementsJournal2202/13/2017 3:11 PMGovernment-Regulatory0
The Risk Associated With AIJournal2202/6/2017 9:40 AMRisk Management3
Mitigating the Insider ThreatJournal2201/30/2017 3:06 PMRisk Management2
Dispelling Concerns Regarding Quantitative AnalysisJournal2201/23/2017 3:18 PMRisk Management1
Governance and City DevelopmentJournal2201/17/2017 3:01 PMCOBIT-Governance of Enterprise IT 1
Phishing Attacks: Organizations in Troubled Waters Year After Year?Journal2201/9/2017 4:02 PMRisk Management1
The Decision to Adopt Machine Learning for Telemedicine Journal2201/2/2017 8:20 AMCOBIT-Governance of Enterprise IT 0
The Hexa-dimension Metric: Not Just for Data Privacy ProtectionJournal22012/29/2016 3:08 PMPrivacy0
Ethics and Data Protection LawsJournal22012/29/2016 3:08 PMPrivacy0
The Keys to Using Analytic TechniquesJournal22011/14/2016 12:45 PMAudit-Assurance2
Follow-up to Ensure That All Is WellJournal22011/7/2016 11:07 AMAudit-Assurance0
Conduct a More Accurate Risk AssessmentJournal22011/3/2016 3:03 PMRisk Management0
Reducing the Gender Disparity in Cyber SecurityJournal22010/24/2016 3:13 PM2
Practical Considerations in Planning an Open-source Security Monitoring InfrastructureJournal22010/17/2016 3:13 PM0
Why Do IT Governance and Information Security Governance Practices Fail? Journal22010/10/2016 3:55 PM0
Leveraging the NIST 800-53 ControlsJournal22010/3/2016 8:43 AM1
Framework for Protecting Your Valuable IT AssetsJournal2209/26/2016 3:11 PM1
Move From Good to Great With These 7 Tips for Your Awareness ProgramJournal2209/19/2016 3:06 PM0
Simplified Audit ProgramsJournal2209/15/2016 3:03 PM4
Determining the Value of Cloud ComputingJournal2209/12/2016 3:07 PM0
Cybersecurity CostsJournal2209/6/2016 3:05 PM0
While You Are Away From HomeJournal2208/22/2016 3:44 PM0
Is Maintaining Privacy an Uphill Battle?Journal2208/1/2016 8:07 AM1
Managing the Enterprise Mobile App Security EnvironmentJournal2207/25/2016 3:06 PM0
Minimizing the Risk of Cloud AdoptionJournal2207/18/2016 3:02 PM0
SDN Concerns and BenefitsJournal2207/11/2016 3:04 PM0
Personal Information on Your Mobile DevicesJournal2207/5/2016 7:44 AM0
Social Learning and Security AwarenessJournal2206/20/2016 3:06 PM0
Preparing for a Black SwanJournal2206/6/2016 8:23 AM0
The Necessity of SoDJournal2205/31/2016 3:15 PM0
The Role of CIOs and CISOsJournal2205/23/2016 3:11 PM0
Regulatory Management and Measurement RulesJournal2205/16/2016 3:23 PM0
Elliptical Curve Cryptography for the Internet of ThingsJournal2205/9/2016 3:02 PM0
The Benefits of Effective SIEM Policy DevelopmentJournal2205/2/2016 9:46 AM0
Experiences During Government-mandated AuditsJournal2204/28/2016 3:02 PM0
Board Involvement With IT GovernanceJournal2204/25/2016 3:15 PM1
Effective Data VisualizationJournal2204/21/2016 4:15 PM0
Is Cybersecurity Everyone's Concern?Journal2204/18/2016 3:06 PM2
Using Technology for Right or WrongJournal2204/11/2016 3:08 PM0
A Practical Assessment of Application Security Risk Journal2204/4/2016 8:41 AM0
A Nontraditional Approach to Prioritizing and Justifying Cybersecurity InvestmentsJournal2203/28/2016 3:01 PM0
Evaluating Risk by Knowing “What” and “Why”Journal2203/21/2016 8:33 AM0
Differentiating and Understanding the Benefits of Using, Frameworks, Methodologies, Process, Tools and TechniquesJournal2203/14/2016 3:05 PM0
Leveraging Lean to Improve Software EngineeringJournal2203/7/2016 8:27 AM0
The Role of IT in Mergers and AcquisitionsJournal2202/29/2016 3:04 PM0
Protecting Your Organization’s Most Valuable Asset—InformationJournal2202/15/2016 3:16 PM0
When It Comes to Changing IA, Do Not Let Perfection Be the Enemy of the Good EnoughJournal2202/8/2016 3:09 PM2
Using the COBIT 5 Assessment Programme to Improve the Work Process Capability of Auditors, Assurance Professionals and AssessorsJournal2202/1/2016 8:29 AM0
Going Beyond an Audit ChecklistJournal2201/25/2016 3:04 PM3
Audit Universe and the IT Risk Assessment ProcessJournal2201/19/2016 3:11 PM0
Visualization: Inherent or Learned?Journal2201/11/2016 3:24 PM2
How Big Are Your Data?Journal2201/4/2016 8:39 AM0
Internet of Things: Evolution or Revolution of Technology?Journal22011/23/2015 3:02 PM0
Toward a Common Understanding of CybersecurityJournal22011/16/2015 3:06 PM0
Managing Changes in Risk ManagementJournal22011/9/2015 3:11 PM0
From Problem to Ethical SolutionJournal22011/2/2015 9:01 AM0
Understanding Cyberhacking Tools and Techniques Journal22010/5/2015 9:01 AM1
Cyberrecovery and the C-suiteJournal2209/28/2015 3:10 PM0
Mitigating the Quantum Risk to CybersecurityJournal2209/21/2015 3:38 PM0
How to Battle Hackers on an Even Plane Journal2209/14/2015 3:03 PM8
Understanding Underground CybercrimeJournal2209/8/2015 8:22 AM0
The Necessary Prerequisite When Moving to the CloudJournal2208/3/2015 3:04 PM0
The Need for Auditing Linux Operating Systems: A Practical ApproachJournal2207/27/2015 3:06 PM1
Third-party Product Insecurity Is Costing YouJournal2207/20/2015 3:00 PM0
Addressing Vendor Security RiskJournal2207/13/2015 9:27 AM3
Managing a Global Team in the Compliance WorldJournal2207/6/2015 8:14 AM0
Monitoring, Analysis and Incident Management for Secure Data CentersJournal2206/22/2015 3:08 PM0
Examining the Adoption of COBIT 5Journal2206/15/2015 3:10 PM0
Using COBIT to Unlock the Value of Knowledge ManagementJournal2206/8/2015 3:16 PM0
Automation in Security TestingJournal2206/1/2015 7:22 AM1
Develop Sustainable Business Practices with COBIT 5Journal2205/26/2015 3:10 PM2
APT and Social Engineering: With New Threats Come New Assessment MethodologiesJournal2205/18/2015 3:04 PM0
The Limits of RulesJournal2205/11/2015 3:06 PM0
1 - 100 Next