Search for content, post, videos
Dubai
0 COMMENT
4875 Views
The Dream Spot | Dubai

Since the beginning of my business career, I have had the privilege to deal with customers from all corners of the world. Be it at a training center in Colorado Springs, a construction site for a swimming pool championship in Madrid, giving a presentation in Taipei, fixing a measurement problem…

iso 37001
0 COMMENT
3876 Views
Trainer Interview with Ion Iordache

What methodologies do you use while teaching and preparing a curriculum? I try to find out more about the trainees’ needs, expectations, skills, and experience, and understand the relevance of the training for them. Depending on these, I can choose to use a collaborative method to get trainees take responsibilities…

iso 22000
0 COMMENT
7401 Views
TOP 10 FACTS ABOUT FOOD SAFETY

According to a recent study from the World Health Organization (WHO), the top 10 trending facts about Food Safety are: Did you know that more than 200 diseases are spread through food? Millions of people fall ill every year and many die as a result of eating unsafe food. Diarrheal…

dollars-office-mistake
0 COMMENT
4741 Views
More backup dollars than security dollars

Introduction Let us start with defining the following important terms; Backup, Information Security, and Information Assurance Backup In Information Technology, a backup is defined as a process of copying and archiving computer data that can be used to restore the original data after the occurrence of a data loss event…

wind-power-plant-energy-efficient
0 COMMENT
4398 Views
Energy-efficient Technologies and Measures of ISO 50001

Evaluating and Prioritizing the Implementation of New Energy-efficient Technologies and Measures of ISO 50001 Our Current Situation The increasing gas emissions are having a high impact on the concentration of greenhouse gases in the atmosphere. This is causing the global temperature to increase constantly. As a result, organizations worldwide are…

Agile-Security-Information-group-work
0 COMMENT
8707 Views
Matching Information Security and Agile: Volume 2

Turning security assumptions around and have them work for you in agile. While agile development is going mainstream, information security is having difficulties to keep pace. The result of this struggle is that new systems are insecure, or that they are loaded with point solutions for security. What is so…

Business-Email-Scam-Cyber
0 COMMENT
5758 Views
Growing Threats Of Business Email Compromise Scams

Today’s digital frontier can be very much likened to the old days of the Wild West. In this present era identified by the ubiquitous nature of the Internet, cyber criminals are calling the shots; constantly blazing new trails in increasing sophistication in cybercrime and profiting unscrupulously off the backs of…