Posts

  
View: 
Establishing a Triumvirate—Understanding the Interests for Enhancing Collaboration Between the CISO, the CIO and the CROJournal2205/21/2018 4:00 PMSecurity0
Leveraging SOC Use CasesJournal2205/17/2018 3:17 PMSecurity0
How Blockchain Technology Will Revolutionize the Global Workforce and Education SystemJournal2205/7/2018 3:03 PM0
Security of CurrenciesJournal2204/23/2018 3:08 PMCOBIT-Governance of Enterprise IT 0
Performing Cyberinsurance “CPR”Journal2204/16/2018 3:03 PMRisk Management0
IT Innovation Governance: From International Policy to Company OversightJournal2204/9/2018 3:07 PMCOBIT-Governance of Enterprise IT 1
Working With Access Certification DataJournal2204/2/2018 3:14 PMSecurity0
How, Not WhatJournal2203/26/2018 3:10 PMAudit-Assurance0
Innovating Innovation GovernanceJournal2203/19/2018 8:22 AMCOBIT-Governance of Enterprise IT 0
How to Prioritize Security Controls ImplementationJournal2203/12/2018 3:01 PMSecurity1
First Steps for Automating Your IOC Provision SourcesJournal2203/8/2018 3:03 PMSecurity0
Cryptographically Protecting Databases Against Data BreachesJournal2203/5/2018 3:23 PMSecurity0
Developing a DLP ProgramJournal2202/26/2018 3:17 PMSecurity1
Leveraging Artificial IntelligenceJournal2202/19/2018 3:36 PMRisk Management2
Working With Big DataJournal2202/15/2018 2:18 PMSecurity0
Big Data in OrganizationsJournal2202/12/2018 3:08 PMSecurity0
Updating the COBIT Process Assessment ModelJournal2202/8/2018 3:09 PMCOBIT-Governance of Enterprise IT 0
Putting Machine Learning in PerspectiveJournal2202/5/2018 3:30 PMRisk Management0
Cloudifying Malware: Understanding Cloud App ThreatsJournal2202/1/2018 4:09 PMSecurity0
Auditing Data SecurityJournal2201/29/2018 3:08 PMAudit-Assurance0
Prepare Your Substitutes Journal2201/22/2018 3:14 PMAudit-Assurance0
Evolving Appreciation for Data PrivacyJournal2201/16/2018 3:11 PMPrivacy0
Twelve IoT ControlsJournal22012/28/2017 8:43 AMAudit-Assurance0
Krack Attack—Exploiting Wi-Fi Networks Journal22012/21/2017 3:06 PMSecurity0
A Different Approach to AssuranceJournal22012/19/2017 3:18 PMAudit-Assurance1
Calculating Cloud ROIJournal22012/11/2017 3:08 PMCloud Computing0
My First Mobile DeviceJournal22012/4/2017 9:00 AMAudit-Assurance2
Caught in the Act: Targeting Ransomware on the WireJournal22011/20/2017 3:04 PMSecurity0
The Role of Certifications in the Hiring ProcessJournal22011/13/2017 3:10 PMCertification1
The Risk of Third PartiesJournal22011/6/2017 3:09 PMRisk Management0
Steps to Enforcing Information Governance and Security ProgramsJournal22010/23/2017 3:06 PMSecurity1
The Darkest Moments of a Cybereclipse Are Best Examined Through a Quantitative LensJournal22010/16/2017 3:06 PMRisk Management0
Why Privacy by Design Is a Stride Toward Consumercentric DesignJournal22010/9/2017 3:05 PMPrivacy0
Examining the “Compliant, Yet Breached” PhenomenonJournal22010/2/2017 8:53 AMSecurity2
The Future Looks Promising for Blockchain Technology Journal2209/25/2017 3:14 PMSecurity0
SSH: Why You Need to CareJournal2209/21/2017 3:02 PMSecurity0
Tracking Vulnerability Fixes to ProductionJournal2209/18/2017 1:53 PMSecurity0
Equifax: Too Soon for Lessons Learned?Journal2209/8/2017 2:54 PMSecurity1
Stuck in the Middle With YouJournal2209/5/2017 8:51 AMAudit-Assurance0
ESA: What Is It and How Does it Work?Journal2208/28/2017 3:48 PMSecurity4
Developing an Information Privacy PlanJournal2208/14/2017 3:13 PMPrivacy0
Questions to Ask When Selecting an ITIL Automation ToolJournal2207/24/2017 3:26 PMSecurity0
The Absence of IT Governance CodesJournal2207/17/2017 3:03 PMGovernment-Regulatory3
Obtaining Accurate HTTPS Posture InformationJournal2207/3/2017 8:20 AMSecurity0
Strengthening Risk Management in the Wake of Petya Ransomware OutbreakJournal2206/28/2017 2:17 PMRisk Management2
Using Hackers’ Own Tools Against Them Journal2206/26/2017 3:11 PMSecurity0
Emotional Labor Journal2206/22/2017 3:05 PMAudit-Assurance0
The Key for Evaluating IT Asset, Risk Impact and Control GapJournal2206/19/2017 3:43 PMRisk Management2
Leverage Enterprise Data Management Investments to Facilitate Data Breach Reporting RequirementsJournal2206/5/2017 8:17 AMGovernment-Regulatory0
Securing Connected DevicesJournal2205/15/2017 3:13 PMSecurity0
Holistic View of Addressing IoT Risk by Leveraging a Decomposition StrategyJournal2205/8/2017 3:08 PMRisk Management0
Securing Mobile AppsJournal2205/1/2017 3:40 PM0
Agile Audit PracticeJournal2204/10/2017 3:07 PMAudit-Assurance1
How to Manage Third-party RiskJournal2204/3/2017 8:31 AMRisk Management1
The Value of Risk ComparisonJournal2203/27/2017 3:10 PMRisk Management0
Going for the ATOJournal2203/13/2017 3:04 PMGovernment-Regulatory0
SSH: A Useful but Potentially Risky Tool Journal2202/27/2017 3:01 PMSecurity0
A Framework to Evaluate PAM ImplementationJournal2202/21/2017 9:11 AMRisk Management0
EU GDPR: Embracing Privacy RequirementsJournal2202/13/2017 3:11 PMGovernment-Regulatory0
The Risk Associated With AIJournal2202/6/2017 9:40 AMRisk Management3
Mitigating the Insider ThreatJournal2201/30/2017 3:06 PMRisk Management2
Dispelling Concerns Regarding Quantitative AnalysisJournal2201/23/2017 3:18 PMRisk Management1
Governance and City DevelopmentJournal2201/17/2017 3:01 PMCOBIT-Governance of Enterprise IT 1
Phishing Attacks: Organizations in Troubled Waters Year After Year?Journal2201/9/2017 4:02 PMRisk Management1
The Decision to Adopt Machine Learning for Telemedicine Journal2201/2/2017 8:20 AMCOBIT-Governance of Enterprise IT 0
The Hexa-dimension Metric: Not Just for Data Privacy ProtectionJournal22012/29/2016 3:08 PMPrivacy0
Ethics and Data Protection LawsJournal22012/29/2016 3:08 PMPrivacy0
The Keys to Using Analytic TechniquesJournal22011/14/2016 12:45 PMAudit-Assurance2
Follow-up to Ensure That All Is WellJournal22011/7/2016 11:07 AMAudit-Assurance0
Conduct a More Accurate Risk AssessmentJournal22011/3/2016 3:03 PMRisk Management0
Reducing the Gender Disparity in Cyber SecurityJournal22010/24/2016 3:13 PM2
Practical Considerations in Planning an Open-source Security Monitoring InfrastructureJournal22010/17/2016 3:13 PM0
Why Do IT Governance and Information Security Governance Practices Fail? Journal22010/10/2016 3:55 PM0
Leveraging the NIST 800-53 ControlsJournal22010/3/2016 8:43 AM1
Framework for Protecting Your Valuable IT AssetsJournal2209/26/2016 3:11 PM1
Move From Good to Great With These 7 Tips for Your Awareness ProgramJournal2209/19/2016 3:06 PM0
Simplified Audit ProgramsJournal2209/15/2016 3:03 PM4
Determining the Value of Cloud ComputingJournal2209/12/2016 3:07 PM0
Cybersecurity CostsJournal2209/6/2016 3:05 PM0
While You Are Away From HomeJournal2208/22/2016 3:44 PM0
Is Maintaining Privacy an Uphill Battle?Journal2208/1/2016 8:07 AM1
Managing the Enterprise Mobile App Security EnvironmentJournal2207/25/2016 3:06 PM0
Minimizing the Risk of Cloud AdoptionJournal2207/18/2016 3:02 PM0
SDN Concerns and BenefitsJournal2207/11/2016 3:04 PM0
Personal Information on Your Mobile DevicesJournal2207/5/2016 7:44 AM0
Social Learning and Security AwarenessJournal2206/20/2016 3:06 PM0
Preparing for a Black SwanJournal2206/6/2016 8:23 AM0
The Necessity of SoDJournal2205/31/2016 3:15 PM0
The Role of CIOs and CISOsJournal2205/23/2016 3:11 PM0
Regulatory Management and Measurement RulesJournal2205/16/2016 3:23 PM0
Elliptical Curve Cryptography for the Internet of ThingsJournal2205/9/2016 3:02 PM0
The Benefits of Effective SIEM Policy DevelopmentJournal2205/2/2016 9:46 AM0
Experiences During Government-mandated AuditsJournal2204/28/2016 3:02 PM0
Board Involvement With IT GovernanceJournal2204/25/2016 3:15 PM1
Effective Data VisualizationJournal2204/21/2016 4:15 PM0
Is Cybersecurity Everyone's Concern?Journal2204/18/2016 3:06 PM2
Using Technology for Right or WrongJournal2204/11/2016 3:08 PM0
A Practical Assessment of Application Security Risk Journal2204/4/2016 8:41 AM0
A Nontraditional Approach to Prioritizing and Justifying Cybersecurity InvestmentsJournal2203/28/2016 3:01 PM0
Evaluating Risk by Knowing “What” and “Why”Journal2203/21/2016 8:33 AM0
1 - 100 Next