Search for content, post, videos
0 COMMENT
4877 Views
Security Considerations for 5G Technology Enablers

In order to completely fulfill the business needs driving the development of 5G by the 3GPP standard organization, 5G uses and introduces technology enablers that transform 5G networks into cloud-based, programmable, software-driven, service-based, and holistically-managed infrastructures, utilizing enablers such as cloud technologies, Artificial Intelligence, open APIs, and Multi-access Edge Computing.…

0 COMMENT
2972 Views
Tips on Maintaining a Healthy Work-Life Balance

Discussions around work-life balance and burnouts are one of the most common. Due to the flow that the world is operating at, whatever your job may be, most industries are becoming notoriously demanding, with roles carrying vast pressure and responsibility. To quote Nigel Marsh in his TED Talk on this…

0 COMMENT
2837 Views
Abilene Academy’s Success Story

When I was asked to contribute to the Success Story portion in this edition of PECB’s Insights Magazine, I wondered what I would be talking about. First of all, what is success and have we really experienced a success story? This gave me an opportunity to meet with the Abilene…

0 COMMENT
2694 Views
ISO Turns 75!

It’s three-quarters of a century since ISO brought the world’s standards bodies together to commence its operations. When ISO held its first meeting in 1947, countries around the world were rebuilding and people were looking for ways to turn a dire situation into something more positive. They set out with…

0 COMMENT
3366 Views
The Cybersecurity Skills Gap

Why education is our best weapon against cybercrime. The Internet has been one of the biggest winners in the past year’s pandemic, with traffic and transactions reaching unprecedented levels in 2020. Unsurprisingly, the number of malicious attacks and activity has risen with it. According to INTERPOL Secretary- General Jürgen Stock,…

0 COMMENT
14399 Views
ISO/IEC 27002 New Version Highlights and Impacts on Compliance

As cybersecurity threats and attacks increase by leaps and bounds, the International Organization of Standardization (ISO) has developed and periodically updates information security frameworks to provide guidance on the implementation of controls to protect information assets. ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information security…

0 COMMENT
3578 Views
Big Data Analytics in Higher Education

Data is an essential component of the daily operations of businesses. This includes data on customers’ needs, which is usually collected to improve processes, products, or services. Big data comes in large volumes, from different sources, with different structures and types, and at high speeds. It is too large to…

0 COMMENT
3212 Views
Social Media in Emergency Management

A new ISO standard gives guidance on the right way to keep people informed in a crisis. For many organizations and businesses, social media is a valuable opportunity to reach out to the people that matter to them. The speed with which information can be made available also means that…