Search for content, post, videos
daniel-seid-ISO-IEC-27001-Certified
0 COMMENT
5736 Views
Between Profession & Family

The Story of Daniel Seid, a PECB Certified ISO/IEC 27001 Master Looking back over the last decade, it’s remarkable how much PECB’s network has achieved and advanced professionally. Such advancement is not only a result of our training development and deliverables, but also of the ways by which we’ve been…

ISO-22301-business-continuity-meeting-team
0 COMMENT
21289 Views
ISO 22301:2019 What Will Change?

The first edition of ISO 22301 was launched in May 2012. It was the first truly internationally accepted standard on business continuity, and it consists of requirements to implement a Business Continuity Management System according to ISO Annex SL. As such, it stood in line with its prominent predecessors such…

5-G-Smart-Cities-future
0 COMMENT
6611 Views
Will 5G Be the Platform for Tomorrow’s Smart Cities?

Connectivity is one of the main pillars that are defining life in the 21st century. The level of depth that connectivity defines our routines in this century is truly astonishing. With a particular boost after the first decade of the century, we have developed not only habits, but entirely new…

Marriott-cyber-attack-breach-security
0 COMMENT
6014 Views
Marriott’s’ 500 Million Data Breach Scandal

A politically inclined attack or just a ‘simple’ lack of security awareness? Whatever the case, the cyber-attack that hit Marriott was huge. This was the joint second largest data breach to take place, after Yahoo in 2013 and Equifax in 2017. A cyber attacker stole personal information including names, emails,…

Melbourne-best-city-live
0 COMMENT
5927 Views
Melbourne | The Best City to Live on Earth

Melbourne has been considered “the most livable city in the world” over the past seven years, this year being dethroned by Vienna, the Austrian capital, according to the Economist Intelligence Unit‘s 2018 rankings. I am originally from Romania and before deciding to live in Melbourne, we lived in Adelaide, South…

past-future-global-security-privacy-worldwide
0 COMMENT
4413 Views
Remembering the Past | Engendering the Future

The philosopher Santayana is famous for having once warned: “Those who cannot remember the past are condemned to repeat it.” Recent events have provided several sobering examples of just how true that is. The Apple-FBI dispute was perhaps one of the most recent, painful examples we’ve witnessed a debate the…

catch-wave-jobs-of-the-future
0 COMMENT
5502 Views
Catch the Wave: What are the Jobs of the Future?

We are all talking about the future of jobs. But the question that we should perhaps ask, the most essential one, is: How should those jobs look like (or what should those jobs be)? With the evolution of the nature of the job market, we are facing new realities and…

0 COMMENT
405 Views
Software-Defined Vehicles (SDVs) and the Automotive Industry

The advent of Software-Defined Vehicles (SDVs) represents a fundamental shift in the automotive industry. SDVs separate software from hardware, allowing high-level software development on generalized hardware systems. This decoupling provides several benefits: it reduces time and costs associated with hardware production, enhances security through simplif ied software systems, and fosters…

0 COMMENT
1726 Views
The Emerging Risk Artificial Intelligence

The capitalization of business opportunities and securing markets imply agile creativity and innovation. It involves meeting and exceeding stakeholders’ expectations, delivering products and services on time, and enhancing partners, clients, and customers’ experience. By utilizing emerging technologies like artificial intelligence (AI), organizations can rapidly achieve their mission and strategic goals,…

0 COMMENT
1546 Views
What to Do If Your Information Is Compromised?

Data breaches have become a frequent and lamentable phenomenon in the contemporary digital landscape, with far-reaching implications for countless individuals and entities globally. These breaches carry the potential for grave consequences, encompassing identity theft, financial repercussions, legal fines, and reputational harm. Both individuals and organizations must comprehend the necessary measures…

0 COMMENT
1128 Views
Q&A from the Webinar

AI RISK MANAGEMENT: ISO/IEC 42001, THE EU AI ACT, AND ISO/IEC 23894 As artificial intelligence rapidly advances, the need for robust AI risk management is more critical than ever. Navigating the complexities and regulations surrounding AI requires a deep understanding of emerging standards and legislative frameworks. Delve into key insights…

0 COMMENT
2177 Views
Unique Security Challenges of IoT Devices and Best Practices for Securing Them

This article will present cybersecurity vulnerabilities exclusive to the Internet of Things (IoT) and develop a corporate strategy to mitigate them and their impact. This article references risk and technology lifecycle management frameworks to help organizations plan and implement an effective cybersecurity strategy with technology, people, and processes. Additionally, this…

0 COMMENT
1898 Views
Identity and Privacy A Complex Relationship

Individuals are not present in information systems; only data about individuals is. Therefore, the relationship that exists between a piece of information and the person or people who are associated with it is what we mean when we talk about identity. As an illustration, a data item may be created…

0 COMMENT
2002 Views
Decoding Quantum Encryption: The Future of Secure Communication

In a world where digital communication forms the backbone of our connected society, ensuring the security and privacy of data is paramount. While effective, traditional encryption methods face growing challenges from advances in computing technology. Enter quantum encryption, a groundbreaking approach poised to revolutionize data security. This article explores the…

0 COMMENT
1407 Views
What is access control?

A customer calls asking for details about how they are registered in your company’s database, so they can make sure their information is updated. You get a phone call from a business partner who needs to contact your colleague and asks you to check her calendar to see when she is free.…