
There is no disputing technology's role in business today as an enabler of virtually every process and function. With this enablement and the advantages IT brings also come global risks - security, cyberattacks, privacy issues, data breaches, governance, asset management and much more. The critical question we must ask is: Are IT audit practices keeping pace in order to assess, monitor and mitigate critical risks coupled to a technology-enabled business?
Continue Reading

In the not too distant past, many organizations viewed the data that they kept on individuals as business property, to be used as the organization determined appropriate. Today, many of the world’s leading markets have adopted regulations that restrict how and when organizations may use those data, and afford the subject individuals rights to access and correct those data. Nations have even adopted regulations that impact how an organization may use such data outside of that nation. Consumer awareness of privacy matters has also risen, creating marketing risks to organizations that are not concerned with data privacy.
Continue Reading

Before we talk about acceptance testing, let’s clarify first what we mean exactly and how it differs from unit testing.
Continue Reading

The design of a testing strategy is primarily a process of identifying and prioritizing project risks and deciding what actions to take to mitigate them. A good testing strategy has many positive effects:
Continue Reading