Read more about ISACA
Bookmark and Share
  • From identity and access solutions to access governance

    20.08.2012

    Over the past decade, there has been a tsunami of identity and access management technology.

  • ISACA issues COBIT 5 for Information Security

    02.07.2012

    ISACA released COBIT 5 for Information Security, which builds on the COBIT 5 framework to provide practical guidance for those interested in security at all levels of an enterprise.

  • Highest paying IT certifications

    18.06.2012

    ISACA’s Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) credentials have been named two of the highest-paying IT certifications in the latest Foote Partners’ IT Skills and Certifications Pay Index (ITSCPI).

  • IT candidates should shift career perspectives

    14.05.2012

    Recruiting in the technology sector is strong, despite weaknesses and structural changes the economy has experienced over the past several years.

  • Location-based apps thrive despite privacy concerns

    03.05.2012

    Fifty-eight percent of consumers who have a smart device use location-based applications, despite concerns about safety and third-party use of their personal information for marketing purposes, according to a survey from ISACA.




Spotlight

Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //