Top IT Security Bloggers

Isaca
  • Audit: A Key Success Factor

    Isaca
    Why is it that some companies succeed and others fail? There is a general consensus certain things are common among successful companies. We call these things key success factors. Key success factors are essential attributes that are critical to an organization reaching its business goals.There is no agreed-upon list of success factors because they vary depending on the nature of the business, among other things. Some business experts would say good, productive employees are a key success fac...
  • Reinvent Your IT So You Can Disrupt and Handle Disruption

    Isaca
    It may not be on the mind of every CEO, CIO or CTO but the rise of disruption is of major concern. Disruption itself has always been a part of business theory under Michael Porter’s five forces and classified as “the threat of new entrants”; but this threat has continued to evolve.Barriers to entry in various markets have been in place to control competition. However, modern disruption can occur outside these barriers with the “disruptors” changing the very way the market sector operates ther...
  • No Small Matter: Securing the Digital Economy for Enterprises of Any Size

    Isaca
    Every day, in every corner of the world, at every minute, small- and medium-sized enterprises (SMEs) are opening up stores, serving clients, delighting customers (or not). And while the classic SME picture may be the storefront, SME reality means constant commerce, updating web presences to buy, sell and service everything; work that begins before dawn and ends long after night has fallen. While precise measurements are difficult due to differing definitions of SMEs, research by the World Ban...
  • Friendliness, happiness and social media at the office (beware)

    Isaca
    Let us be frank. Unless your company’s business is IT-related, and thus security is part of what you sell, or mandatory regulations define most of your operations (you see, it’s not us, it is the SEC), chances are your fellow employees suffer and/or resent the security control function. It’s a fact of life.I have been in the IT control, audit and security profession for around 20 years. I have been volunteering and contributing with ISACA since 1999. And what I bring here today is common know...
  • Building a Security Culture has Its Benefits

    Isaca
    Since I created the Security Culture Framework in 2012 and open sourced it in 2013, the interest in security culture has exploded worldwide. When I first started in the industry, security culture professionals were but a small group of specialists in the US and Europe, discussing how we, based on our experience, built functional security cultures in organizations around the world. Today, only a few years later, the interest in security culture is truly global, with a large number of organizat...
  • Blockchain, a Technology Innovation That Can Change Everything

    Isaca
    Sometimes a technology intended to fill one purpose is found to have much greater potential filling a different purpose; a potential so impactful that it could literally change everything. Blockchain, the underlying technology behind bitcoin, has that potential. While changing everything is perhaps an overstatement, blockchain is seen as a technological solution to the centuries old problem of how to create a secure and open ledger system of transactions.Bitcoin is a cryptocurrency, which me...
  • Mark Kaigwa: Mobility Has Massive Implications for Africa

    Isaca
    ISACA Now recently talked with Mark Kaigwa, African IT entrepreneur, about the future of IT in Africa. Kaigwa is a keynote speaker at the first-ever Africa CACS at the InterContinental Nairobi, Kenya, which takes place Monday, 8 August to Tuesday, 9 August. For more information click here.The following is a question-and-answer session with Kaigwa.ISACA NOW:  It seems that the opportunities for IT in Africa are endless. Obviously, social media is huge. What other opportunities for IT in Afric...
  • Six Ways to Deliver Better Risk Assessment

    Isaca
    Over time, the term risk assessment has become so commonplace that it has almost lost its meaning and is now much maligned. Organizations run helter-skelter carrying out risk assessments that eventually become exercises in futility. One wonders why well-meaning managers, highly paid consultants and C-suite members with years of experience, access to tons of research, and armed with the best intentions eventually end up with unusable outcomes? Here are 6 key lessons from more than a decade of...
  • A Campaign Everyone Can Support

    Isaca
    From the activities of political parties to the rise of electronic, wireless voting and tabulation machines, the electoral process has increasingly become technology-driven expanding voter participation. On the one hand, improved access and outreach through cyber innovations encourages more citizenry to help shaping their community’s or nation’s future. On the other, it has meant that elections and the electoral process are now vulnerable to cybersecurity attacks. Although media outlets world...
  • GRC Solution: Now More Than Ever After Brexit

    Isaca
    Author’s note:  Whatever your political views on the United Kingdom’s recent “Brexit” from the European Union, I am writing this article to share some of my thinking on the need for a Governance, Risk and Compliance (GRC) solution in the aftermath of this decision. It’s just my opinion, but it has been formed after extensive discussions about the implications of the decision. Thursday 23rd June was a most momentous day in Great Britain; the UK voted to leave the EU! It was widely believe,...