journal header

Volume 1, 2019

This Week's Online-Exclusive Feature

Continuous Modernization

Continuous Modernization
16 January 2019
Vinay Parisa, IBM Certified IT Architect, Biswajit Mohapatra, IBM Certified Executive Consultant and Srividya Vinod, IBM Certified Consultant

Blockchain, cognitive computing, artificial intelligence (AI) and virtual reality are revolutionizing the way people work. The evolution of these emerging technologies is largely due to the adoption of the disruptive technologies of the past—namely, cloud, analytics, mobile and social. While cloud adoption initially began with a desire to reduce the cost of computing and storage, organizations now see the cloud as a catalyst for innovation and as a platform that enables new customer experiences. Cloud computing has evolved from an innovation to an integral part of business enablement. “Cloud computing is now a substantial part of new IT spend, expected to grow more than [US] $195 billion in 2020.” Read More >>

Indicates Online-Exclusive Content



This Week's Featured Blog

Rajul Kambli

What Are Challenges in Deployment and How Can They Be Mitigated?
3 January 2019
Rajul Kambli, CISA, CMA

Transformation offers many key benefits, and any enterprise that would like to sustain and grow in this ever-changing, fast-paced world would be subject to the deployment of new systems. In my recent ISACA Journal article, I discuss various challenges that any enterprise might experience and how the intensity of any of those challenges would differ based on organizational dynamics and economic variables.

Here are some key points that any enterprise should consider in the deployment process... Read More >>

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

Assurance Considerations for Ongoing GDPR Conformance

Affect What Is Next Now

Auditing the IoT

Add Value to What Is Valued

Auditing Data Privacy

Innovation in the IT Audit Process


Full Journal Issues

Volume 1, 2018 The Future of Data Protection

Volume 6, 2017 Transforming Data

Volume 5, 2017 Enabling the Speed of Business

Volume 4, 2017 Mobile Workforce

Volume 3, 2017 The Internet of Things

Volume 2, 2017 The Evolution of Audit

Sponsored Feature Articles

Why Attackers Are Turning Their Attention Toward ERP Applications

Innovating Internal Audit to Unlock Value

Centralized, Model-Driven Visibility Key to IT-OT Security Management

The AICPA’s New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key Stakeholders

Indicators of Exposure and Attack Surface Visualization