ISACA Whitepapers


Sort by: Date | Company | Title


How to Identify JavaScript Attacks
By ISACA | 5/12/2016

New ISACA guidance will help cybersecurity professionals identify a form of attack that enriches hackers by utilising JavaScript code to redirect users to advertisements that generate revenue for the hacker.

Download this now


Firmware Security an overlooked threat
By ISACA | 24/10/2016

An increase in connected devices as part of organisations’ hardware footprint, combined with increasingly inventive attack methods from cybercriminals, has brought firmware security into the spotlight. A new study from global business technology and cybersecurity association ISACA reveals that while organisations are increasingly aware of the growing importance of firmware security, most businesses don’t have comprehensive programs in place to address firmware vulnerabilities within their infrastructure.

Download this now