There are some technologies that seem to have their own “gravitational pull.” By this, I don’t just mean technologies that...
Month: November 2016
ISACA Now recently had the opportunity for a Q&A with Garry Barnes, CISA, CISM, CGEIT, CRISC, MAICD and ISACA International...
Put yourself in the shoes of an attacker: Your objective is to infiltrate an organization, deploy ransomware and get paid....
Our commitment to making prevention a core component of architecture is real. As such, we created a standard assessment methodology...
People with deep technical skills are in high demand, so internal audit needs to take extra care to ensure the...