News

Enterprises rely heavily on internal audit functions to stay on track with business objectives, meet regulatory requirements, and handle risk effectively.
Only 28% of organizations have a formal AI policy, leaving many at risk. Protect your enterprise with ISACA's customizable AI ...
View the exclusive survey infographic now to uncover the key takeaways and see where your organization stands in the quantum race. Explore ISACA's quantum roadmap revealing key steps to take to ...
The rapid growth in the use of artificial intelligence (AI) technologies, especially generative AI (genAI), is driven by the myriad benefits these technologies are purported to provide. But in the ...
Author: Engr. Muhammad Mushfiqur Rahman, CISA, CCISO, CISSP, OSCP, PMP, LPT (Master), CISM, CRISC, CGEIT, CDPSE, CEH, CHFI, ECSA, CSA, CTIA, CLPTP, ISO 27001 LA, CND ...
ISACA surveyed 3,270 digital trust professionals around the world to get their real-time AI insights on key topics such as knowledge gaps, training, policies and jobs outlook. View the infographics ...
Governance, risk and compliance (GRC) is a framework and set of practices that help establish a comprehensive and integrated approach to govern and manage an organization. It promotes good governance ...
In 2016, the cybersecurity world was abuzz due to the Bangladesh Bank cyberheist. It played out like a scene from a Hollywood blockbuster—a team of highly skilled hackers orchestrated a massive heist ...
Digital ecosystems of federated identity can provide new and interesting benefits; however, they have not yet reached full maturity. It is essential to continuously stay up to date with technological ...
Author: Jenai Marinkovic, President, Chairman of the Board - GRC for Intelligent Ecosystems Foundation ...
Author: Jason Lau, CGEIT, CRISC, CISA, CISM, CDPSE, CISSP, CIPP/E, CIPM, CIPT, CEH, HCISPP, FIP, ISACA Board Director, and Chief Information Security Officer at ...
Abstract: Privacy dark patterns are deceptive tactics that trick or manipulate consumers into sharing more data than they may prefer. Many enterprises employ dark ...