The incident involving a door plug blowing off an Alaska Airlines 737 Max 9 in early January has sparked significant concern and investigations into the quality management processes at Boeing. The Federal Aviation Administration (FAA) grounded 171 other 737 Max 9s and initiated an audit of the aircraft's production line, emphasizing the critical need for verification during the … [Read more...] about Boeing 737 Max 9 Issue Reveals Important Lessons on Quality Management
Forum Discussion: What are the Requirements for Products and Services in ISO 9001?
The discussion in the Elsmar Cove Quality Forum revolves around a member's struggle with clauses 8.2.2 and 8.2.3 of a quality management standard following a major issue raised by an auditor. The primary concern was the need for more objective evidence of contract review within the organization. Participants in the forum shared insights and suggestions on addressing this issue, … [Read more...] about Forum Discussion: What are the Requirements for Products and Services in ISO 9001?
How To Choose Which Factory Audit You Need?
Choosing the right factory audit is crucial for importers to evaluate potential suppliers' reliability, capabilities, and risks. Given the variety of factory audits available, making the right selection depends on several factors, including the possibility of conducting an on-site audit, the supplier's willingness to be audited, and the specific aspects the buyer wishes to … [Read more...] about How To Choose Which Factory Audit You Need?
Five core practices for Operational Excellence (OpEx)
Benjamin Taylor's article outlines the essence of Operational Excellence (OpEx) and its reliance on people-centric approaches. The piece humorously begins by depicting managers' selective attention to OpEx principles, often overlooking the crucial chapter on Respect For People. However, Taylor emphasizes that at the Operational Excellence Summit in Hamburg, a resounding theme … [Read more...] about Five core practices for Operational Excellence (OpEx)
Artificial Intelligence in Manufacturing
This article highlights the transformative impact of Artificial Intelligence (AI) and Machine Learning (ML) in the manufacturing sector, particularly within the context of Smart Manufacturing (SM). It delves into how AI and ML technologies enhance productivity, precision, and performance in manufacturing operations. AI is depicted as a broad set of software systems capable of … [Read more...] about Artificial Intelligence in Manufacturing
Can You Still Fail With a Quality System?
Boeing has experienced challenging incidents over the past year, highlighting potential weaknesses within its Quality system. Various issues, ranging from lost wheels and cracked cockpit windows to engine fires across different flights and aircraft models, including the 737 MAX series, have raised concerns about the effectiveness of Boeing's quality management and safety … [Read more...] about Can You Still Fail With a Quality System?
Quality Manager Interview Questions for 2024
This article by Lucy Brown serves as a comprehensive guide for candidates preparing for a Quality Manager position, emphasizing the importance of showcasing technical expertise, leadership, problem-solving skills, and adaptability in the quality management domain. It outlines a structured interview preparation approach, presenting a range of questions from beginner to advanced … [Read more...] about Quality Manager Interview Questions for 2024
Data Protection and Recovery: A Foundation to a Cyber Readiness Plan
The whitepaper on "Data Protection and Recovery: A Foundation to a Cyber Readiness Plan" emphasizes the growing sophistication of ransomware and malware attacks, which pose significant economic threats to businesses. The document highlights the need for a new approach to cybersecurity, particularly in protecting information management systems and data. It underscores the … [Read more...] about Data Protection and Recovery: A Foundation to a Cyber Readiness Plan
Key reasons third-party risk management programs fail
John P. Mello Jr.'s article discusses organizations' prevalent challenges in managing third-party cybersecurity risks and offers insights into developing an effective risk management program. According to a Gartner report, over 80% of organizations have encountered business disruptions due to third-party issues in the past two years, highlighting the importance yet difficulty … [Read more...] about Key reasons third-party risk management programs fail
Cybersecurity Risk Management: Frameworks, Plans, & Best Practices
This article by Mark Knowles discusses the complexities and challenges of managing cybersecurity risks in today's digital environment. The article acknowledges the increasing difficulty of maintaining secure and compliant architectures and systems. Cybersecurity consultant Dave Hatter highlights how digitizing business and personal information has amplified risks. The … [Read more...] about Cybersecurity Risk Management: Frameworks, Plans, & Best Practices
How to Use ISO 27001 to Manage Cyber Attacks
Points that will be covered during this episode and then discussed further in subsequent episodes, include:A well-designed system requires that you identify potential sources of a security breach,mitigate them and provide a strong ongoing defense system for your information. An attack will happen – it’s not a case of ‘if’ it’s a matter of ‘when’.It’s virtually impossible to … [Read more...] about How to Use ISO 27001 to Manage Cyber Attacks
Security Assessment for an IoT-Based System
This article from QASource highlights the critical importance of security in the rapidly growing Internet of Things (IoT) market. With projections indicating significant growth in the IoT sector, the need for comprehensive security measures to protect data and services managed by IoT devices has become paramount. The article emphasizes the complexities of IoT architectures, … [Read more...] about Security Assessment for an IoT-Based System
Demystifying ISO 27701: A Comprehensive Guide for Data Privacy Management
This article sheds light on the significance of ISO 27701 in data privacy management. ISO 27701, in particular, extends the principles of ISO 27001, which concentrates on information security, to include data privacy aspects. This standard is designed to help organizations manage and protect personally identifiable information (PII) effectively, ensuring compliance with privacy … [Read more...] about Demystifying ISO 27701: A Comprehensive Guide for Data Privacy Management
Mastering NIST Penetration Testing: Your Essential Guide to Robust Cybersecurity
This article emphasizes the importance of penetration testing in strengthening an organization's cybersecurity defenses. It outlines the National Institute of Standards and Technology (NIST) Penetration Testing Framework, which provides a structured approach to security assessments, helping organizations protect against potential threats. The framework comprises four key … [Read more...] about Mastering NIST Penetration Testing: Your Essential Guide to Robust Cybersecurity
Improving Enterprise Patching for General IT Systems
This NIST publication addresses the critical challenge of patch management in cybersecurity. Authored by experts from the National Cybersecurity Center of Excellence (NCCoE) at NIST and collaborators from various organizations, including Microsoft and The MITRE Corporation, the publication provides practical guidance for enhancing patching practices within IT systems.The … [Read more...] about Improving Enterprise Patching for General IT Systems
Getting Started With Passkeys, One Service at a Time
This article by Robert Lemos discusses the growing momentum of passkeys, a technology designed to replace traditional passwords for logging into websites and cloud services. Major technology companies like Apple, Google, Microsoft, and third-party password providers such as 1Password and Bitwarden have embraced passkeys. This widespread adoption is in response to the … [Read more...] about Getting Started With Passkeys, One Service at a Time
IBM’s Cost of a Data Breach Report 2023 finds the average cost of a data breach at $4.45 million
IBM Security's 2023 Cost of a Data Breach Report provides critical insights for IT, risk management, and security leaders. The report analyzed data from 553 organizations across 16 countries and regions and 17 industries that experienced data breaches between March 2022 and March 2023. This year's report introduces new areas of exploration, including how breaches are … [Read more...] about IBM’s Cost of a Data Breach Report 2023 finds the average cost of a data breach at $4.45 million
What Security Breach Notification Laws Exist for Every U.S. State
In the United States, the safeguarding of personal information is governed by a complex array of federal laws and state legislation tailored to specific industries, each with its scope and jurisdiction. This diversity presents a significant challenge to organizations operating nationwide regarding compliance.Every state, including the District of Columbia, Guam, Puerto Rico, … [Read more...] about What Security Breach Notification Laws Exist for Every U.S. State
“Lions and tigers and bears, oh my!” Global legal risks in cybersecurity investigations
This article by Brian Hengesbaugh delves into the complex global legal challenges companies face during cybersecurity investigations, particularly in the context of global ransomware and cyberattacks. Drawing an analogy to the fears expressed in "The Wizard of Oz," the article underscores how companies grapple with varied and sometimes conflicting legal obligations across … [Read more...] about “Lions and tigers and bears, oh my!” Global legal risks in cybersecurity investigations
The salary of a Chief Security Officer
The 22nd annual Security and Compliance Compensation report, produced by The Foushée Group, provides a comprehensive analysis of the salaries and compensation trends in the security and compliance sector. This survey, conducted annually for the last 22 years, aims to offer accurate and timely compensation information for 78 security and compliance positions. The survey targets … [Read more...] about The salary of a Chief Security Officer