No items have been added to your cart yet
Oleksii Baranovskyi, of Ukraine, recipient of the ISACA Educational Excellence Award, is proud to simultaneously be a security professional and an educator.
Cybersecurity leaders should be mindful of the composition of their security teams, including common characteristics of Gen Z cyber professionals, when devising their approaches to leadership.
Mitigating the technology and information security risks from terminating third parties calls for organizations to formulate nuanced security strategies.
A major breach in France reinforces the need for sharpened security practices and the overarching imperative to drive toward strengthening digital trust.
Ransomware often targets small-to-medium enterprises, so security teams need to take action to be more prepared for this potentially devastating line of attack.
The Cybersecurity Maturity Model Certification standard helps businesses to examine their computing ecosystem and enhance capabilities for stronger supply chain resilience.
As regulatory frameworks for the AI era continue to evolve, governments around the world will need to find a shared sense of purpose and collaborate on the best way forward.
Accounting for key characteristics of trustworthiness and considering perspectives from a range of stakeholders are among the needed ingredients to strengthen AI governance.
Avoiding these light-hearted 'tips' for preparing for the CISA exam will put you in better position for a successful exam-day experience.
Responsible development of artificial intelligence that recognizes the need for a balance between AI and human capabilities is the path to ensure the powerful technology's good outweighs the bad.
By asking the right questions around people, processes and technical controls, auditors can gather the evidence and documentations they need to successfully audit social engineering.
Prioritizing comprehensive cybersecurity strategy in support of overarching enterprise goals can position enterprises for success, even amid challenging threat and regulatory environments.
Court rulings that AI cannot be granted patents provided needed short-term clarity but there are still many open questions about how AI should be viewed in legal, ethical and practical contexts.
Technology-minded countries around the world can learn a lot from Rwanda, which, despite limited resources, has become a digital benchmark through an impressive set of initiatives and ingenuity.
Identifying the flows, assets and vulnerabilities are among the key building blocks when threat modeling for software applications.
Artificial intelligence is a human creation that reflects the people who developed it, meaning we must guard against humans' shortcomings and biases resulting in AI furthering inequality and other societal harms.
Global cybersecurity practitioners share their perspectives on Australia's new cyber shields strategy to provide more robust protection of digital assets in the coming years.
Ill-designed controls can waste organizations' time and resources, so make sure implementing controls is more than just a power move.
Organizations implementing artificial intelligence into their operations will need strong governance in place to ensure transparency and trust in their AI usage.
When executed properly, risk and control self-assessments become enablers for organizations to more effectively navigate the risk management landscape.
As the intersection between cybersecurity and privacy increases, security professionals can benefit from gaining a solid understanding of core privacy terminology and privacy principles.
Challenges on the privacy landscape can be successfully addressed through upskilling, privacy by design principles and solid training and awareness programs.
The ISACA Mentorship Program has proven to be rewarding for mentors and mentees alike, allowing for valuable connections to propel ISACA members' careers to new heights.
Focusing attention on understanding and building confidence in post-quantum cryptography now can save the security community major problems in the years to come.
ISACA’s Digital Trust Ecosystem Framework (DTEF) empowers organizations to build and sustain digital trust in the age of artificial intelligence and other impactful technological advancements.
An identity system based on trust in a third party could better protect personal data and improve trust throughout the digital ecosystem.
New ISACA digital trust resources, thought leadership, and upcoming events, both in-person and virtual, are among the coming attractions in 2024 for the ISACA community.
Promoting a culture of ongoing learning and upskilling is part of the equation for organizations looking to develop a more capable and resilient workforce
Defining and articulating a clear strategy for a security operations center (SOC) will make it much more likely that organizational leaders and other key stakeholders will support the SOC on an ongoing basis.
Given its focus on human behavior in an organizational change context, change management can lead to a fresh and valuable perspective on cybersecurity