journal header

Volume 6, 2017

This Week's Online-Exclusive Feature

Configuration Management: Using COBIT 5

Book Review—Configuration Management: Using COBIT 5
22 November 2017
Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation

Configuration Management: Using COBIT 5 provides a clear and concise walk-through of the configuration management process and associated threats, mitigation actions, COBIT 5 enablers and other useful information. It is based on the COBIT 5 enabling process BAI10 Manage configuration and includes MEA01 Monitor, evaluate and assess performance and conformance, specifically for configuration management. This latter enabling process is useful in that it includes some customized activities to perform periodic evaluations of the configuration management performance. Read More >>

Indicates Online-Exclusive Content



Podcast  New!
ISACA Journal Volume 5 Podcast

Information Security in the Multi-Modal Era

This Week's Featured Blog

Caught in the Act: Targeting Ransomware on the Wire
20 November 2017
Clemens Kolbitsch

Ransomware holds a tight grip on its victims and their most valuable data and is a global epidemic reaching all corners of the world.

The most commonly used infection vectors used by ransomware are email attachments, links in emails, compromised websites and malvertising. The first type, attacks via email attachments, can be intercepted by a security or gateway appliance before a user even receives the lure. Read More >>

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

Auditing Mobile Devices

Doing More With Less

Audit Programs

The Soft Skills Challenge, Part 7

Data Management Body of Knowledge—A Summary for Auditors

Risk-based Audit Planning for Beginners


Full Journal Issues

Volume 6, 2016 Governance, Risk and Compliance

Volume 5, 2016 Cybersecurity

Volume 4, 2016 Mobile Apps

Volume 3, 2016 Data Privacy

Volume 2, 2016 Project Management: Methodologies and Associated Risk

Volume 1, 2016 Transforming the Auditor