News

As software continues to play a greater role in everyday life, it is crucial to be able to understand and control it.
ISACA’s white paper, Threat Modeling Revisited, provides a step-by-step process for organizations to integrate threat modeling into their security frameworks.
A new policy will help US-based credential candidates fund ISACA certifications and training through their 529 savings accounts.
Build AI skills at any level. Access articles, whitepapers, and publications. Explore new training courses and discover how to harness AI's power for success.
One of the best ways to prevent data leaks and other security breaches is establishing effective threat modeling. Threat models are critical to a wide range of industries, as they provide security, ...
Discover what audit professionals need to do to keep their ISACA Advanced in AI Audit (AAIA) certification active.
Organizations are ramping up their use of AI to make business processes more efficient. Adoption is high, and the same goes for the advancement of the AI models powering this technology.
This guide brings together thought leadership from seasoned professionals who are navigating the intersection of AI and IT ...
A greater number of audit certification holders around the globe now meet the requirements to pursue the new ISACA Advanced in AI Audit (AAIA) certification—the first and only advanced audit-specific ...
To secure valuable data, organizations need to implement digital trust in software supply chains; however, several key challenges, vulnerabilities, and risk factors must be addressed to establish ...
Despite AI's potential, it also involves new risk. Any failure of implementation or data quality variance may worsen the environmental landscape rather than protect it.