journal header

Volume 2, 2017

This Week's Online-Exclusive Feature

Cloud Computing in Developing Countries: Opportunities and Challenges
29 March 2017
Awais Ahmed, CISA, CIA

The number of fixed and mobile broadband subscribers, Internet users and cellular service consumers is on the rise globally. Figure 1 indicates positive trends in the use of broadband and mobile phone technology, while subscriptions for fixed telephone lines are decreasing.

Advanced countries are the first to explore and utilize the opportunities provided by technological breakthroughs such as cloud computing. As a result of higher information and communications technology (ICT) penetration rates in affluent markets, the adoption of breakthroughs in shared computing is relatively fast, especially by the private sector. In addition, the public sector of wealthier economies is showing a positive trajectory in the adoption of cloud-based solutions. Read More >>

Indicates Online-Exclusive Content

 

 


Podcast  New!
ISACA Journal Volume 1 Podcast

The Automation Conundrum

This Week's Featured Blog

The Value of Risk Comparison
27 March 2017
Mukul Pareek, CISA, ACA, ACMA, PRM

When I used to run vulnerability management for a previous employer, my colleagues and internal clients would stop me in the corridors and ask, “Hey Mukul, how vulnerable are we today?” Of course, this question was largely unanswerable or, at best, deserving of a rhetorical answer. Yet not wanting to appear clueless about my area of responsibility, over time I found myself responding as to whether we were better or worse off than the last week or the last month. This response would normally satisfy most, but a few curious folks would ask how I knew that. I did not know how I knew, but doing the job day in and day out gave me a gut feeling...or so I thought. Read More >>

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

Navigating the US Federal Government Agency ATO Process for IT Security Professionals

The Auditors, IS/IT Policies and Compliance

Preparing for Auditing New Risk, Part 2

Preparing for Auditing New Risk, Part 1

The Soft Skills Challenge, Part 6

The Soft Skills Challenge, Part 5

 

Full Journal Issues

Volume 2, 2016 Project Management: Methodologies and Associated Risk

Volume 1, 2016 Transforming the Auditor

Volume 6, 2015 The Internet of Things

Volume 5, 2015 Cybersecurity

Volume 4, 2015 Regulations & Compliance

Volume 3, 2015 Governance and Management of Enterprise IT (GEIT)