journal header

Volume 6, 2017

This Week's Online-Exclusive Feature

Using Darknet Concepts for IoT Security: Tor of Things

Using Darknet Concepts for IoT Security: Tor of Things
13 December 2017
Mike Kuzminski, CISM, CISSP

In today’s always-connected world, the concept of device connectivity, the Internet of Things (IoT), has already solidified. Chances are most people are probably using it somewhere in their lives whether they know it or not. A 2016 report stated that there will be 34 billion devices connected to the Internet by 2020. Of those, 24 billion will be IoT devices and the remaining 10 billion will be traditional computing devices such as smartphones, computers and tablets.

Those who believe they own only “traditional computing devices,” not IoT devices, may need to look at their devices again. Some may remember when they thought it would be convenient and even trendy to have the refrigerator display the family calendar or have the washing machine send a notification to a phone when it is done. Does this sound familiar? Read More >>

Indicates Online-Exclusive Content

 

 


This Week's Featured Blog

Calculating Cloud ROI
11 December 2017
Ed Moyle

The past few years have changed how organizations perceive—and how they use—cloud technologies. If that sounds fairly obvious to you, it should. After all, the cloud has evolved significantly over the past few years. In addition to large-scale use of Infrastructure as a Service and the continued expansion of virtualization technologies, we are also starting to see new models emerge. Platform as a Service for example, while still comparatively less used (relative to other cloud models), has seen new service types emerge (e.g., “serverless”), while Software as a Service has continued to proliferate.

A few years ago, ISACA published a detailed model for practitioners on how to calculate return on investments (ROI) for cloud deployments. As we all know, historically, much of cloud adoption has been financially driven, meaning executives see the cloud as a way to reduce costs, to leverage economies of scale and to allow them to focus resources (and time) on their core competencies rather than the workaday mechanics of supporting technology infrastructure... Read More >>

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

Auditing Mobile Devices

Doing More With Less

Audit Programs

The Soft Skills Challenge, Part 7

Data Management Body of Knowledge—A Summary for Auditors

Risk-based Audit Planning for Beginners

 

Full Journal Issues

Volume 6, 2016 Governance, Risk and Compliance

Volume 5, 2016 Cybersecurity

Volume 4, 2016 Mobile Apps

Volume 3, 2016 Data Privacy

Volume 2, 2016 Project Management: Methodologies and Associated Risk

Volume 1, 2016 Transforming the Auditor