Search for content, post, videos
0 COMMENT
5122 Views
Security Considerations for 5G Technology Enablers

In order to completely fulfill the business needs driving the development of 5G by the 3GPP standard organization, 5G uses and introduces technology enablers that transform 5G networks into cloud-based, programmable, software-driven, service-based, and holistically-managed infrastructures, utilizing enablers such as cloud technologies, Artificial Intelligence, open APIs, and Multi-access Edge Computing.…

0 COMMENT
3127 Views
Tips on Maintaining a Healthy Work-Life Balance

Discussions around work-life balance and burnouts are one of the most common. Due to the flow that the world is operating at, whatever your job may be, most industries are becoming notoriously demanding, with roles carrying vast pressure and responsibility. To quote Nigel Marsh in his TED Talk on this…

0 COMMENT
3005 Views
Abilene Academy’s Success Story

When I was asked to contribute to the Success Story portion in this edition of PECB’s Insights Magazine, I wondered what I would be talking about. First of all, what is success and have we really experienced a success story? This gave me an opportunity to meet with the Abilene…

0 COMMENT
2806 Views
ISO Turns 75!

It’s three-quarters of a century since ISO brought the world’s standards bodies together to commence its operations. When ISO held its first meeting in 1947, countries around the world were rebuilding and people were looking for ways to turn a dire situation into something more positive. They set out with…

0 COMMENT
3543 Views
The Cybersecurity Skills Gap

Why education is our best weapon against cybercrime. The Internet has been one of the biggest winners in the past year’s pandemic, with traffic and transactions reaching unprecedented levels in 2020. Unsurprisingly, the number of malicious attacks and activity has risen with it. According to INTERPOL Secretary- General Jürgen Stock,…

0 COMMENT
14740 Views
ISO/IEC 27002 New Version Highlights and Impacts on Compliance

As cybersecurity threats and attacks increase by leaps and bounds, the International Organization of Standardization (ISO) has developed and periodically updates information security frameworks to provide guidance on the implementation of controls to protect information assets. ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information security…

0 COMMENT
3757 Views
Big Data Analytics in Higher Education

Data is an essential component of the daily operations of businesses. This includes data on customers’ needs, which is usually collected to improve processes, products, or services. Big data comes in large volumes, from different sources, with different structures and types, and at high speeds. It is too large to…