Layering Defences to Safeguard Sensitive Data Within AI Systems
Strategies for mitigating privacy and security risks As artificial intelligence develops relentlessly,…
Boost Your Security Posture With Objective-Based Penetration Testing
To maximise value from your security investments, your measures must be effective…
Understanding audit and risk — Matt Palmer
Everything we do creates risk. Crossing the street, climbing a mountain, even…
Good auditor or bad auditor – which are you?
Updated from the original published on July 5, 2010 All auditors expect…
An introduction to IT Audit & Information Assurance careers — Matt Palmer
Who should read this?You’re here because you want to learn more about…
What do auditors do all day? — Matt Palmer
If you’ve ever sat at your desk wondering what exactly the bunch…
List of IT Audit Professional Bodies & Certifications — Matt Palmer
The below list covers the key professional bodies and certifications to consider…
Should I get CISA Certified? — Matt Palmer
CISA is possibly the one ‘pure’ Information systems audit qualification that is…
Strategies for Securing Your Supply Chain
What to do when your ‘supply chain’ is really a ‘supply loop’…
Is CISM certification right for IT Auditors? — Matt Palmer
The Certified Information Systems Manager (CISM) qualification is provided by ISACA, and…