16th WCAS: "16th World Continuous Auditing & Reporting Symposium will be held November 7-8th 2008 at the Rutgers Business School, Room 123, Lecture Hall, Ackerson Hall
180 University Avenue, Newark, NJ"
Technology, security, analytics and innovation in the world of audit and business.
Tuesday, October 28, 2008
Monday, October 27, 2008
Desktop Virtualization Drives Security, Not Just Dollar Savings -- Desktop Virtualization
While desktop virtualization (VDI) has been gaining in usage, it is only beginning to attract the attention of security professionals. yet, with all the problems that have been experiencedwith laptops going missing - stolen or lost, that contain sensitive information, it may provide an ideal solution. VDI allows the operating system and core applications to be stored on a central server and accessed from a PC remotely. The process in hardware indepenedent and can enable central storage of data and still allow users to load their favourite applications on the server. The best of all worlds. Desktop Virtualization Drives Security, Not Just Dollar Savings -- Desktop Virtualization
Thursday, October 23, 2008
Technology Review: The Flaw at the Heart of the Internet
A DNS expert has found a vulnerability in the basic structure of the internet that will undermine a lot of the security around the system. The ability to bypass DNS lookups could be a boon to Phishers. IS Auditors will have to give some thought to how they will deal with this new issue in terms of testing. Technology Review: The Flaw at the Heart of the Internet
Saturday, October 18, 2008
Arek: Service-Oriented Architecture
Service Oriented Architecture (SOA) is becoming widely used to restructure systems for higher performance and greater accuracy and reliability. At the following link, Accenture describes how SOA was used to develop a better pension-earnings system for Arek, which runs a centralized pension registry in Finland. Arek: Service-Oriented Architecture
Tuesday, October 14, 2008
Tough economic climate can heighten insider threat
Some of the biggest risks to business systems come from inside the company. This is always true, because of the privileged access that insiders have. However, in tough economic times, this risk is even higher and it calls for additional vigilence by systems security personnel. Tough economic climate can heighten insider threat
Friday, October 10, 2008
Exposure Comments
A summary of all of the comments received to date on COSO's June exposure draft on Guidance on Monitoring Internal Control Systems cna be found at the following link: Exposure Comments
Thursday, October 9, 2008
E-Commerce News: Enterprise IT: IBM Enlarges Sphere of Influence in the Cloud
Social Networking is working its way into IT systems in various ways. Generally, Facebook and Facebook look-alikes are not mainstream vehicles for business systems. IBM has come out with a new tool - Bluehouse - that will likely be mainstream. It is a social networking site that is used in the growing cloud computing space. There will be more tools like this in future. E-Commerce News: Enterprise IT: IBM Enlarges Sphere of Influence in the Cloud
Wednesday, October 8, 2008
Technology White Papers from WebBuyersGuide
Technology White Papers from WebBuyersGuide: "You need accurate, trustworthy data to meet today's GRC requirements. What will it cost your organization if your auditors receive incorrect information? What if your regulatory reports are inaccurate? Download this white paper today to explore the critical role data quality plays in GRC, and how Informatica can help ensure complete and trusted information for GRC. With advice and knowledge from real-world customer success stories, this White Paper will help you to understand how to satisfy regulatory data audit and documentation requirements, minimize IT project risk, and reduce the cost of producing timely and trusted data for GRC."
Tuesday, October 7, 2008
IBM Systems Journal | Vol. 47, No. 3, 2008 - SOA: From Modeling to Implementation
IBM Systems Journal Vol. 47, No. 3, 2008 - SOA: From Modeling to Implementation: "As many businesses, applications, and platforms make the transition to a service-oriented architecture (SOA), significant changes are required in business process design as well as in modeling and solution development. To this end, innovative techniques, tools, and methodologies from a variety of SOA deployments are being developed for use in future solutions. This issue contains eight papers which describe challenges and insights related to modeling, testing, and governance, which have emerged from SOA engagements in a variety of industries."
Monday, October 6, 2008
Vendors rush to fix bug that could crash Internet systems
A recently discovered bug in TCP-IP is causing a number of vendors to adopt remedial measures. TCP-IP, the core of Internet communications is vulnerable to denial of service attacks because of the bug or bugs. Microsoft says it is investigating, but hasn't taken any action yet. Vendors rush to fix bug that could crash Internet systems
Subscribe to:
Posts (Atom)