Top IT Security Bloggers

Isaca
  • Digital Ethics Rising in Importance

    Isaca
    The innovative capabilities of technology – as well as the potency of that technology – is advancing at a remarkable pace, creating new possibilities in today’s digital economy. This is mostly wonderful, with one large caveat: we must keep in mind that just because we have the ability to deploy a new technological innovation does not mean that we should. The need to prioritize digital ethics is becoming increasingly important for all organizations that are mindful about the imprint that they a...
  • ISACA’s Past, Future Come Together at North America CACS

    Isaca
    ISACA’s 50th anniversary year is about simultaneously honoring our past while visualizing how our professional community will innovate the future. Last week’s experience at our North America CACS conference in Anaheim provided tremendous inspiration on both fronts.I will pay homage to ISACA’s remarkable past later in this post, but I want to start by highlighting a member story that underscores why we have such a bright future. I had the privilege of helping to open the conference by sharing...
  • Internal Audit Should Take Multifaceted Approach to Robotic Process Automation

    Isaca
    In the same manner that the adoption of ERP applications and the use of offshore labor arbitrage and outsourcing previously transformed the workplace, robotic process automation (RPA) and intelligent automation are demonstrating the potential to be the next megatrends to help organizations improve the efficiencies and performance of back-office operations. As many organizations are just beginning their journeys to implement RPA technologies, this presents an opportunity for internal audit grou...
  • A Deeper Look Into the WhatsApp Hack and the Complex Cyber Weapons Industry

    Isaca
    On 13 May, the Financial Times reported the discovery of a major security flaw in the popular messaging app, WhatsApp. The pervasive vulnerability, which affected both Apple and Android devices, allowed malicious actors to inject commercial spyware by ringing up unsuspecting targets using WhatsApp’s VOIP-based call function. The world is now accustomed to daily data breach news. What makes this threat particularly disturbing, however, is its novelty and deftness. This flaw allowed hackers to...
  • Securing Major League Baseball - On and Off the Field

    Isaca
    Three strikes and you're out is one of the more well-known sayings in baseball, but it only takes one devastating cyberattack to inflict huge damage on Major League Baseball or any of its 30 teams.At Wednesday's session, "It's Only Baseball: Technology and our National Pastime - A Security Perspective," at ISACA’s 2019 North America CACS conference in Anaheim, California, USA, Neil Boland, the CISO of Major League Baseball, and Albert Castro, director of information technology with...
  • The Evolution and Power of Disruptive Technology: Insights From an Executive Panel at NA CACS

    Isaca
    At ISACA’s North America CACS conference Tuesday morning, an executive panel spoke on the past 50 years of tech disruption—and where technology is taking us in the future.Technology has truly democratized society, according to the panelists. “I want to impress on everyone how easy it is to disrupt technology today and how little knowledge you need in order to do it,” panelist Jed Yueh, founder of Amavar and author of Disrupt or Die, told the audience. “You can go from idea to building a comp...
  • A Spectrum of Professions: ‘The World Needs Us’

    Isaca
    From the days of determining how to secure and derive value from early computers to today’s challenges as organizations enact digital transformation, it has been a remarkable 50 years for ISACA’s professional community. That trajectory came into focus Monday during the 50th anniversary-themed “Spectrum of Professions” panel, part of ISACA’s 2019 North America CACS conference in Anaheim, California, USA.Moderator Marios Damianides and panelists Kelly Lin, Jenai Marinkovic, Dean Kingsley, Paul...
  • IT Audit: Stay Relevant or Perish

    Isaca
    “Victory awaits him who has everything in order – luck, people call it. Defeat is certain for him who has neglected to take necessary precautions in time. This is called bad luck.” –Roald Amundsen, The South PoleThe title and the quote above says it all – and fits the essence of the 2019 Global IT Audit Benchmarking Study, conducted by ISACA and Protiviti.An executive summary of the 2019 IT Audit Benchmarking Study, which will be released in full later this year, found that the biggest chall...
  • Driving or Driven by Disruption: The AI Maturity Model

    Isaca
    On 25 April 2019, Microsoft passed the trillion-dollar market cap threshold and passed Apple as the most valuable company in the world.Almost a year earlier, Satya Nadella, Microsoft’s CEO, talked about a new world vision that has helped propel the organization’s cloud and revenue growth. “It's amazing to think of a world as a computer,” Nadella said, referring to a planet filled with smartphones, Internet of Things devices and cloud computing. And in a world that is a computer, Nadella has...
  • The Features and Challenges of IoT-Based Access Control

    Isaca
    Employees and guests can use IoT-based access control for convenient access. Through their mobile device, they can be connected to a facility’s access control through digital ID securely.IoT is an integrated network of devices that are connected through internet, capable of communicating with each other without human intervention. Every device in the network has a unique IP address assigned for communication. They are connected with specific sensors to perform some action at a trigger of an e...