News
Friction between the cybersecurity team and the business can keep organizations from innovating the way they need to, but key mindset shifts can reposition cybersecurity as a partner instead of an ...
Maintaining an inventory of all machine identities and assigning ownership for all non-human identities are among the key steps that can improve organizations' identity management.
Cloud computing helps enterprises lower TCO, boost ROI, improve efficiency, enable dynamic provisioning, and offer ...
Learn more about how you can leverage privacy and data management to meet organizational goals with ISACA®’s publication ...
Machine learning (ML) and artificial intelligence (AI) are being used to better equip cybersecurity teams for emerging ...
Discover how to unify data security and compliance needs while protecting IP and reputation in this white paper on evolving ...
This white paper discusses how complementary these functions can be to each other, and to the overall development of ...
Blockchain and distributed ledger technologies are poised to take on applications across the breadth of the global digital ...
This joint project from ISACA and The Institute of Internal Auditors Research Foundation offers guidance to board members on ...
In this two-part series, we provide an overview of machine learning (ML) and the current audit considerations, which focuses on compliance risk associated with ML.
With the fast pace of digital transformation, IT auditors may find themselves at a crossroads. Auditors are finding their roles within an enterprise shifting as they are asked to provide their ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results