CISA Study Resources

| | cisa
The Certified Information Systems Auditor (CISA) is for security professionals with an interest in information systems (IS) auditing, control and security. It is a globally recognized certification... Go on to the site to read the full article ... Read More

How to Recover from A Business Email Compromise (BEC) Attack

How to Recover from A Business Email Compromise (BEC) Attack Business email compromise (BEC) is one of the most devastating, and costly, cyber attacks of all time — it’s estimated organizations... Go on to the site to read the full article ... Read More

Job Outlook for CISA Professionals

| | CISA Job Outlook
Introduction The Certified Information System Auditor (CISA) certification is a globally recognized certification focusing on the audit, control and security of information systems (IS). It is a... Go on to the site to read the full article ... Read More

Certified Information Systems Auditor (CISA): Exam Details and Processes

Introduction The Certified Information Systems Auditor (CISA) certification is for individuals who have interest in information systems auditing, control and security. It is a globally recognized... Go on to the site to read the full article ... Read More
Understanding the Cloak & Dagger Attack: Overview & Tutorial

Understanding the Cloak & Dagger Attack: Overview & Tutorial

The Cloak and Dagger Attack is a method dealing with mismatched permission issues to access certain features on an Android device up to version 7.1.2. Certain vulnerabilities exist in the... Go on to the site to read the full article ... Read More
Computer Forensics: Civil Investigations

Computer Forensics: Civil Investigations

The Role of Computer Forensics in Civil Investigations The use of Computer forensics in civil investigations is a little different when compared to criminal cases. There are different standards for... Go on to the site to read the full article ... Read More
Computer Forensics: Criminal Investigations

Computer Forensics: Criminal Investigations

Computer Forensics: An Inseparable Part of Criminal Investigations Computer Forensics has become an increasingly important element in cyber inquiry. Its use is not just limited to monitoring the... Go on to the site to read the full article ... Read More
E-Discovery and Computer Forensics – How are They Different?

E-Discovery and Computer Forensics – How are They Different?

Introduction to E-Discovery E-discovery is the procedure by which parties involved in a legal case collect, preserve, review and exchange information in electronic format to use it as an evidence in... Go on to the site to read the full article ... Read More
The Unattended Use of Stingray Devices Finally Gets Noticed

The Unattended Use of Stingray Devices Finally Gets Noticed

Police agencies around the United States are using the “Stingray,” a powerful surveillance tool, which is even more potent than a spyware app made for wireless devices. This device is... Go on to the site to read the full article ... Read More