Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
What are some of the key audit and risk trends to track? David Melnick of Deloitte answers that...
Maine's two senators stood together as the only current Republicans to back President Obama's stimulus package, but have diverged on whether a senior White House official should coordinate government cybersecurity.
As President Obama announced his plan to secure government information systems, sides are being drawn among those who feel there should be a strong presence in the White House to guide cybersecurity policy and those who think such a post is unwarranted.
A hard drive containing one terabyte of data from the Clinton presidency that include more than 100,000 Social Security numbers, including that of one of Al Gore's daughters, and Secret Service operating procedures is missing from the National Archives.
The National Archives and Records Administration answers key questions about a missing computer disk containing records from the Clinton White House, including 100,000 Social Security numbers and Secret Service procedures.
Some of the government's most influential officials on government IT paint a dire picture of IT security, agreeing that the Federal Information Security Management Act isn't working as originally intended to safeguard federal information systems.
Are too many wandering eyes employing Department of Homeland Security's IT systems to gander sensitive DHS financial documents?
An audit by DHS's inspector general, made public Wednesday, identified IT general control weaknesses, the most significant from a financial statement audit perspective that includes: