Supply chain security activities aim to amplify the security of supply chains, transport, and logistic systems for the world’s cargo and to facilitate legitimate trading. Their objective is combining traditional practices of supply chain management with the security requirements driven by threats, such as; terrorism, piracy, and theft. Digital supply…
“If you see hackers, you see Usi,” someone once suggested I use this line to introduce myself. Perhaps they presumed that people who do not know me would easily remember how to pronounce my name and possibly remember who I am. Throughout my life; teachers, teammates, college professors, coworkers, and…
A recent International Standard is helping bring new clarity to the complex world of finance and investment. ISO 4914 provides a new way of identifying and understanding specific types of financial products known as OTC derivatives, and brings much-needed clarity to the sector. Finance expert Emma Kalliomaki explains. In the…
On November 4, 2021, the Department of Defense (DoD) introduced the new, revised version of the Cybersecurity Maturity Model Certification (CMMC) for their 300,000+ supply chain contractor organizations. This new version development effort, which started in March 2021, was the culmination of DoD’s program review of the CMMC endeavor enacted…
Nowadays, we are seeing that information is being exposed to a variety of risks, as a result of an increasingly interconnected environment. Digital threats such as ransomware and phishing attacks are becoming more common and sophisticated, and this is making the implementation and updating of information security controls and processes…
As the technology that surrounds us keeps evolving rapidly, the level of its complexity is increasing as well, leading to potential misuse. Prioritizing data protection is becoming very prominent. Not everyone can study the field and understand all details, however, reading a book to learn portions of it will do…
In April 2021, the IT Security Act 2.0 was passed by the German Federal Ministry of the Interior. Among other things, the regulation provides for changes in connection with the protection of critical infrastructures (KRITIS). For example, KRITIS companies are confronted with the expansion of their reporting obligations. CARMAO GmbH…
In January 2014, SAE International, formerly known as the Society of Automotive Engineers, classified the future of the automobile. A system was developed defining six levels of automated driving from SAE Level Zero (no automation) to SAE Level 5 (full vehicle autonomy). It has since become one of the most…
In order to completely fulfill the business needs driving the development of 5G by the 3GPP standard organization, 5G uses and introduces technology enablers that transform 5G networks into cloud-based, programmable, software-driven, service-based, and holistically-managed infrastructures, utilizing enablers such as cloud technologies, Artificial Intelligence, open APIs, and Multi-access Edge Computing.…
Discussions around work-life balance and burnouts are one of the most common. Due to the flow that the world is operating at, whatever your job may be, most industries are becoming notoriously demanding, with roles carrying vast pressure and responsibility. To quote Nigel Marsh in his TED Talk on this…