News
View the exclusive survey infographic now to uncover the key takeaways and see where your organization stands in the quantum race. Explore ISACA's quantum roadmap revealing key steps to take to ...
In the rapidly evolving landscape of the 21 st century, sustainability has emerged as a cornerstone of global efforts to address the pressing challenges of resource scarcity and environmental ...
The rapid growth in the use of artificial intelligence (AI) technologies, especially generative AI (genAI), is driven by the myriad benefits these technologies are purported to provide. But in the ...
Author: Engr. Muhammad Mushfiqur Rahman, CISA, CCISO, CISSP, OSCP, PMP, LPT (Master), CISM, CRISC, CGEIT, CDPSE, CEH, CHFI, ECSA, CSA, CTIA, CLPTP, ISO 27001 LA, CND ...
The data interoperability challenge in global digital health, as experienced in the context of the variety of national electronic health record (EHR) deployments around the world, should have been ...
In 2016, the cybersecurity world was abuzz due to the Bangladesh Bank cyberheist. It played out like a scene from a Hollywood blockbuster—a team of highly skilled hackers orchestrated a massive heist ...
Author: Jenai Marinkovic, President, Chairman of the Board - GRC for Intelligent Ecosystems Foundation ...
Author: Jason Lau, CGEIT, CRISC, CISA, CISM, CDPSE, CISSP, CIPP/E, CIPM, CIPT, CEH, HCISPP, FIP, ISACA Board Director, and Chief Information Security Officer at ...
Author: Ramona Ratiu, MS, CISM, CISA, Head of Cyber Resilience Testing, Zurich Insurance, and Past President of ISACA Chicago Chapter ...
Data are the center of global business. They are essential to every function across an organization, making the ability to protect, retrieve, analyze and leverage data a requirement for the ...
Human error has always been a leading cause of cybersecurity breaches. According to Verizon’s 2022 Data Breach Investigations Report, 82 percent of data breaches ...
Although data breaches are among the most common damaging cyber events, ascertaining their costs remains challenging. These incidents expose sensitive data—including personally identifiable ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results