2007

 

 

 

 

 

 

 

Other Issues
2008
2006
2005-1998

December
To Vista or Not to Vista
Keeping it Simple - An Overview of Data Privacy Compliance Requirements
Essential Aspects of an Effective Network Performance Audit

November
Assessing Bandwith Use As a Function of Network Performance
Key Points to Keep in Mind When Conducting a Software Audit
Facing the E-discovery Challenge: A Proactive Approach

October
Six Ways to Protect Privileged Accounts
Why Good Security Testing Tools Matter
Five Common Spreadsheet Risks and Ways to Control Them

September
Conducting Effective Audits of Messaging Systems
Enhancing the Effectiveness of Software Development Projects
The Enterprise Software Risk Analysis: Your Defense Against Data Security Threats

August
Using XBRL - Audit and Control Implications
Internal Controls to Examine When Auditing Backend Operations of Messaging Systems
The Problem with Document Destruction

July
Choosing the Right On-demand Compliance Software
Maximizing IT Governance and Information Security Efforts
Extracting Infromation From Spreadsheet Records

June
Evaluating Application Security Controls - Getting Started
Got XBRL
Continuous Online Auditing in the Government Sector

May
Understanding the Risk Management Process
What is Authentication?

April
New Rewards, New Risks: Mitigating SOA Risks at the Network Layer
Use of the Luhn Algorithm in IT Audit and Fraud Detection
Managing Information Risks in Complex IT Systems

March
Evaluating IT General Control Deficiencies
Change Control Audits - A Must for Critical System Functionality
Free Guide Series Provides IT Help for Internal Auditors

February
Recommendations for an Effective Continuous Audit Process
Assessing Bandwidth Use as a Function of Network Performance
Elements of a Good Security Architecture
Maximizing Journal Entry Testing Through Automation

January
11 Steps to an Effective FTP Audit
The Benefits and Challenges of Compliance Automation
New Scoping Methodology May Ease Section 404 Audits

 

Subscribe_June 2014