-
Training Businesses: Expectations for 2016
What are your expectations for 2016? More clients, expanding your portfolio, reducing costs? We asked our partners during the...
-
A Surprising View on Whistleblowers from a Cybersecurity Perspective
The term whistleblower comes from the role a person plays in sports by using a whistle to stop a...
-
9 Burning Questions about Implementing NIST Cybersecurity Framework Using COBIT 5
The most valuable asset any entity possesses is information. Technology plays a key role in the management and protection...
-
War on Cyber Crime – Adopt the Right Portfolio for Your Learners
Today, we are all aware that any kind of organization – big or small, corporate or startup – located...
-
Learning Secure Coding – The Most Effective Information Security Tactic
I am sometimes surprised to see how even those working in the software industry tend to forget where the...
-
Prepare Your Clients for the Rising Risks of Cyber Threats
Nowadays, more often than not, I’m hearing about yet another company that has been a target of a cyber...
-
How RESILIA Could Have Mitigated the Recent Massive Breach at the U.S. Office of Personnel Management
In today’s rapidly changing world of technology, it is becoming more and more difficult for organizations to stay ahead...
-
The One Information Security Course Every Training Company Needs to Offer – Certified Ethical Hacker
Imagine you’re a network administrator. You’re in charge of maintaining the computing environment of your organization by identifying network...
-
Cyber Resilience – Evaluating Relevance of RESILIA
Let me highlight why I believe the recently announced RESILIA™ Cyber Resilience best practices portfolio by AXELOS is relevant...