2006

Other Issues
2008
2007

2005-1998

December
Reaching Compliance Through Foundational IT Controls
Your Customer Data Has Been Compromised, Now What?
Auditing Version Controls for Installed Applications

November
Introducing New IT Systems Into a Sarbanes-Oxley Compliant Environment
Effective IT Controls: Why Continuous Monitoring Requires Automation
Four Elements for an Integrated Security Compliance Platform

October
Implementing RFID Technology: Issues and Challenges for Internal Auditors
Can a Service-oriented Architecture Hinder Sarbanes-Oxley Compliance Efforts?
Digital Records Management - What Auditors Should Know

September
Computer Forensics: A Valuable Audit Tool
Computer and Human Intelligence: A Winning Audit Combination
Issues to Consider Before Auditing a Linux Environment

August
Data Mining 101: Tools and Techniques
Enhancing HIPAA Security Rule Compliance Efforts
Marking the Change to Continuous Auditing

July
Is Your Organization's Business Continuity Plan Effective?
Three Things You Need to Know About Linux Systems
Promoting IT Governance at the CEO Level

June
Are You Famliar With the Most Recent ISO/IEC 17799 Changes?
Getting to Know ITIL
Is Your Organization Ready for a PCI Standard Audit?

May
Adding People to the Security Infrastructure
Considerations for Acquiring an Effective Sarbanes-Oxley Compliance Solution
Establishing Controls for Software Security Assurance

April
The Three Cs of IT Change Management
Using RFID Technology to Enhance Corporate Effectiveness
Preparing for the Security Audit - Recommendations for Beginner IT Auditors

March
Internal Control Best Practices for Small and Mid-size Companies, Part 2
Automated Data Auditing: The Silver Lining of Regulatory Compliance
7 Steps to a Highly Effective IT Compliance Program

February
Key Strategies for Implementing ISO 27001
Choosing the Right Intrusion Prevention System
Internal Control Best Practices for Small and Mid-size Companies, Part 1

January
Best Practices for Developing Online Communication Guidelines
The Role of Spreadsheets in Today's Climate
Botnets Could Be Invading Your Network

 

Subscribe_June 2014