Please turn on your JavaScript for this page to function normally.
Highest paying IT certifications

ISACA’s Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) credentials have been named two of the highest-paying …

IT candidates should shift career perspectives

Recruiting in the technology sector is strong, despite weaknesses and structural changes the economy has experienced over the past several years. Enterprises seem to be …

Location-based apps thrive despite privacy concerns

Fifty-eight percent of consumers who have a smart device use location-based applications, despite concerns about safety and third-party use of their personal information for …

Top enterprise security concerns and IT problems

A global study of more than 1,200 IT professionals in EMEA reveals that, in the last year, more than one in five enterprises has experienced a security breach and one in 10 …

Six principles for effective cloud computing

The growing shift to cloud computing can deliver significant value—but most enterprises have little knowledge of the perils of transferring IT decision making away from …

CRISC certification: Reacting to a radically changing IT landscape

The number of IT professionals seeking the CRISC (Certified in Risk and Information Systems Control) certification continues to rise rapidly. More than 16,000 professionals …

Tips for secure mobile payments

With the increased use of mobile devices to pay for goods and services, traditional wallets with cash and credit cards could one day be obsolete. A new ISACA white paper …

Web application security vulnerabilities and strategies

The use of web applications has soared recently, due to the significant value they can add to enterprises by providing innovative ways to interact with customers. However, so …

ISACA issues COBIT process assessment model

Since COBIT was issued 15 years ago, enterprises worldwide have been using it to assess and improve their IT processes. However, until now there has not been a consistent and …

Strategies for effective data analytics

Organizations with effective data analytics can make stronger business decisions by learning what is working and what is not, what they are doing well, and where they need …

Annual cost of cybercrime highlights need for governance

ISACA commends the Ponemon Institute’s latest “Cost of cybercrime” report for the detail it provides on the indirect costs of IT security attacks, as well as …

IT control objectives for cloud computing

Cloud computing has become a major growth area in IT spending, and enterprises must adapt to the changes it brings to maximize the return on investment. To help organizations …

Don't miss

Cybersecurity news