您的购物车中还没有添加任何物品
Data are a very decisive resource for any business due to shielding; regularly auditing the database should never be left to chance or patchwork solutions.
Today, most organizations continue to rely on a traditional approach to risk management. Such an approach is built on stovepipe-oriented risk management, in which the focus...
Any organization would like to have an optimal approach to a Sarbanes-Oxley Act review, whether it is the process used or the Sarbanes-Oxley review team's composition.
大数据热潮席卷了整个行业. With the advent of cost-effective technologies and solutions for longer-term storage of vast amounts of transaction data, more and more companies are investing in keeping more and more data for longer and longer periods.
随着澳门赌场官方下载越来越依赖IT来取得成功, effective IT risk management has become an essential component of IT governance.与此同时, there are various studies to address risk through the software development life cycle,而其他人则对生产环境中的风险感兴趣.
近年来,服务弹性变得非常重要. A resilient service is one that is capable of withstanding major and minor disruptions caused by natural and man-made sources.
The number and complexity of cyberattacks has been increasing steadily in recent years. The major players in today’s cyberconflicts are well organized and heavily funded teams with specific goals and objectives...
对RSA会议未来的悲观预测, 公众对安全机构的不公平判断, 黑客入侵教皇选举的可能性, 如何成为安全专家...
COBIT 5 establishes a governance layer and does a good job of capturing stakeholder needs, driving enterprise, IT and enabler goals. COBIT 5促进了平衡的使用...
Organizations maintain their operations with the help of processes that differ according to their organizational structure, 业务目标和工作方式.
了解谁拥有数据并不像一开始看起来那么简单. 说所有数据都属于组织是很容易的. 这是正确的,但它没有确定这种所有权的责任.
Over the past few years, there has been a shift in the business world pertaining to assets that need to be protected. 数字世界带来了复杂性...
Considering that the issue of fire protection in computer rooms is not specifically addressed in many national regulations, 美国国家消防协会(NFPA)标准...
Managers looking for a strategy to comply with the US NIST Cybersecurity Framework requirements for response and recovery should give due consideration to Cyber DRaaS.
Business and security teams alike have seen breathtaking changes over the last few years with the rise of a digital universe that is global, social, mobile and interconnected.
重新检查Windows听起来像是重新发明轮子, 但是回顾一下密码策略, account lockout policy and audit policy proves that auditing is not a one-time exercise; rather, it, must be...
The internal audit and information security functions should play complementary roles in an organization’s information security program.
With the advent of the latest wave of information technologies such as big data, social media, 技术即服务和一般的云, 有必要花时间重温一下it审计的基础知识.
So many times, auditors of all types use a computer-generated report to perform some aspect of assurance. For example, financial auditors may pull a computer-generated list of accounts receivable ...
Protecting digital assets and intellectual property (IP) is becoming increasingly challenging for organizations. Looming patent challenges and court battles to claim ownership of IP illustrate the...
Almost all organizations are now dependent, one way or another, on information technology. 这导致了大量的发展以及相关的风险.
A fundamental part of an information systems (IS) audit and control professional’s job is to identify and analyse risk. Furthermore, risk factors need to be stated clearly and concisely to support effective management of risk.
Organizations should establish and implement an organization wide fraud risk management framework that integrates counter fraud capabilities through organization and governance.
Auditors should consider key risk and control points when performing privacy audits. The following methodology draws heavily on concepts presented in ISO 31000:2009 Risk management—Principles and guidelines.
基于云的服务正在兴起. 根据最近的出版物, 云是提供广泛IT服务的未来.
Fourth-generation Long Term Evolution (4G LTE) is a broadband wireless data technology designed to offer users access to technology-agnostic across carriers and geographic regions.
Supervisory control and data acquisition (SCADA) systems are rapidly changing from traditional proprietary protocols to Internet Protocol (IP)-based systems.
在SIEM中犯的七个错误以及如何纠正它们. A foundation for evaluating and implementing essential security control solutions against cyberattacks.
IT governance is an area in which IT and non-IT executives need to communicate at least with a basic understanding of each other’s positions.