Find resources and connect with members on topics that interest you. Browse more than 100 topics or view the featured ones.


Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.



Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center.
Learn More.

Journal Article

Data Science as a Tool for Cloud Security: Cloud Generation Visibility, Detection and Protection

There is no doubt that data science can be used as a core technology to secure and strengthen cloud applications by implementing algorithms that can detect threats through large-scale data mining.


Aditya K. Sood, Ph.D., and Michael Rinehart, Ph.D. Yesterday | 0 comments

Journal Article

Big Data—Hot Air or Hot Topic?

There are many different definitions of the term ‘big data’, and concerns about whether it will necessitate significant changes in business operations in the short term.


Angel Serrano, CISA, CISM, CRISC Yesterday | 0 comments

Journal Article

Information Ethics: Is Information Technology Responsible for Corporate Crises?

Despite all that technology brings to improve lives and the living environment, it just cannot seem to shield itself from creative deployment for the wrong ends.


Vasant Raval, DBA, CISA, ACMA Yesterday | 0 comments

Journal Article

Comparison of PCI DSS and ISO/IEC 27001 Standards

The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card companies, including Visa, MasterCard, American Express, Discover and JCB.


Tolga Mataracioglu, CISA, CISM, COBIT Foundation, CCNA, CEH, ISO 27001 LA, BS 25999 LA, MCP, MCTS, VCP Yesterday | 0 comments

Journal Article

Managing Data Protection and Cybersecurity—Audit’s Role

Data protection and cybersecurity go hand-in-hand due to the nature of the risk involved. The underlying assumption is that all data, whether they are stationary or in motion, are threatened to be compromised.


Mohammed J. Khan, CISA, CRISC, CIPM Yesterday | 0 comments

You must log in to view Knowledge Center Topic updates.