News That Matters to You
This blog features the most up-to-date stories of interest to quality managers specializing in a variety of different areas including safety, environmental, IT, cannabis, and metrology. We also support the professional development needs of employees working in these areas, connecting readers with stories about training, job postings, and career development.
Categories
- Cybersecurity
- Cybersecurity-Artificial Intelligence
- Cybersecurity-Automation
- Cybersecurity-Career
- Cybersecurity-Certification Management
- Cybersecurity-Continuous Improvement
- Cybersecurity-Documentation
- Cybersecurity-ISO 27001
- Cybersecurity-Management
- Cybersecurity-Regulatory
- Cybersecurity-Risk Management
- Cybersecurity-Software
- Cybersecurity-Supplier Quality
- Cybersecurity-Sustainability
- General
- Manufacturing
- Quality-Artificial Intelligence
- Quality-Automation
- Quality-Career
- Quality-Continuous Improvement
- Quality-Cost of Quality
- Quality-Documentation
- Quality-ISO 9001
- Quality-LEAN-6 Sigma
- Quality-Product Safety
- Quality-Quality Management
- Quality-Regulatory
- Quality-Risk Management
- Quality-Root Cause
- Quality-Skills
- Quality-Software
- Quality-Supplier Quality
- Quality-Sustainability
- Safety-Product Safety Certification
- Safety-Risk Management
- Uncategorized
Book Review: “Measuring and Managing Information Risk”
“Measuring and Managing Information Risk” offers a revolutionary, quantitative approach to risk management. It transforms traditional methods and delivers a highly structured framework. While many praise the comprehensive and rigorous analysis, some feel the lack of accessible tools, such as software or templates, limits the practical application of its methodologies. Readers appreciate the informal yet…
Continue Reading Book Review: “Measuring and Managing Information Risk”
Building a Culture of Cyber Resilience in Manufacturing
Manufacturing is increasingly vulnerable to cyberattacks, with 25% of cyber incidents targeting the sector over the past three years. The rise of digitalization, including IIoT and AI, exposes manufacturing ecosystems to ransomware, supply chain attacks, and insider threats. Establishing cyber resilience as a business imperative, designing security measures into operations, and collaborating with ecosystem partners…
Continue Reading Building a Culture of Cyber Resilience in Manufacturing
Implementation Examples for the NIST Cybersecurity Framework 2.0
NIST CSF 2.0 provides practical examples for organizations to manage cybersecurity risks. It focuses on aligning strategies with mission objectives, stakeholder needs, and regulatory requirements. Key areas covered include clear stakeholder communication, developing risk management strategies, and ensuring cybersecurity is integrated into enterprise-wide processes. Continuous improvement, monitoring, and structured response plans are emphasized to adapt…
Continue Reading Implementation Examples for the NIST Cybersecurity Framework 2.0
Should Cybersecurity Leadership Finally be Professionalized?
CISOs face increasing pressure due to expanding cybersecurity threats, regulatory requirements, and personal liability, raising the need for professionalization. A professional body for cybersecurity could offer legal protections, support, and advocacy for better tools and regulations, similar to those in other industries, such as healthcare or law. Despite the benefits, the complexity of cybersecurity and…
Continue Reading Should Cybersecurity Leadership Finally be Professionalized?
The Perilous Role of the CISO: Navigating Modern Minefields
CISOs face increasing risks due to the evolving threat landscape, regulatory pressures, and legal liabilities, leading some to reconsider the role’s value. The CISO role is transitioning from a technical position to one requiring business acumen, with growing importance placed on aligning security with broader business objectives. Despite the risks, the CISO role offers significant…
Continue Reading The Perilous Role of the CISO: Navigating Modern Minefields
12 Best Practices for a Corporate Firewall Review
Regular firewall reviews are essential for maintaining cybersecurity, reducing attack surfaces, and ensuring compliance with industry standards like PCI DSS, HIPAA, and GDPR. Best practices include reviewing firewall rules for effectiveness, auditing user access privileges, and monitoring logs for suspicious activity. Automating firewall management and audits with tools like Tufin can ensure consistency, streamline processes,…
Continue Reading 12 Best Practices for a Corporate Firewall Review
Get our latest post in your inbox.
Join my newsletter to receive our latest long-form content right in your inbox. I also offer up discounts, coupons, and exclusive content to our subscribers. Join today!