Many attorneys representing a client who procures technology from a service provider know to request a security audit, but there is still confusion even among sophisticated technology attorneys about ...
In the early days of computers, many people were suspicious of their ability to replace human beings performing complex tasks. The first business software applications were mostly in the domain of ...
The Department of Veterans Affairs “continues to face significant challenges” in complying with the Federal Information Security Modernization Act—or FISMA—according to an audit released by the VA ...
This concentration equips students with skills and tools required to examine and evaluate an organization's information technology infrastructure, policies and operations. It focuses on the process of ...
Idaho’s new statewide business system lacked a range of information technology controls for data validation and security, according to a summary of audits provided to legislative leaders this week.
Eight standards rolled out in 2006 by the Auditing Standards Board are sparking a cultural shift for auditors. The standards—Statement on Auditing Standards nos. 104–111—are designed to enhance ...
Maintaining proper controls over information technology is a constant concern for businesses as they try to use technological advances to drive efficiency and growth. Principle 11 in the newly updated ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results