The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
When you and I say 'cloud,' we may think of two very different things, ISACA leader Peter Spier writes. Partly this stems from a lack of common definition on the term. Read on to see how such confusion can be overcome.
As mobile devices become ubiquitous in healthcare, more precautionary measures are needed to ensure patient confidentiality. To prevent data breaches, hospitals, clinics and others need to take five essential steps.
The great thing about fraud examination is that you can really play to your own strengths when choosing a career. The following six job roles are just a few of the career paths a fraud examiner might take.
Whether we are dependent on a supply chain or part of a supply chain, we are all vulnerable to disruptions beyond our control. What can we do to work towards achieving our supply chain resilience? Here are some tips.