The article addresses the evolving requirements in part quality assessments within manufacturing processes, emphasizing the need for precise geometric dimension checks and comprehensive documentation. It introduces a critical decision-making process for acquiring new 3D measuring systems—choosing between tactile and optical measurement technologies. Tactile 3D systems, which … [Read more...] about Differentiating Between Tactile and Optical Measurement Technology for Dimensional Inspection
A Fool-proof Plan for Building an Effective CAPA Process
(Note: Whitepaper download requires the creation of a free account and log-in)This whitepaper outlines a plan for building an effective Corrective Action, Preventive Action (CAPA) process, a crucial aspect scrutinized by the Food and Drug Administration (FDA). Highlighting the frequent issuance of warning letters due to poor CAPA implementation and documentation, the paper … [Read more...] about A Fool-proof Plan for Building an Effective CAPA Process
Podcast: Your Path to Become a Certified Lead Auditor
The ISO Review Podcast, hosted by Jim Moran, an ISO Management System Professional with 30 years of experience, delves into the specifics of becoming a certified lead auditor for ISO management systems. Moran explains that every certified ISO management system requires a lead auditor, highlighting the importance of understanding the steps and qualifications necessary for this … [Read more...] about Podcast: Your Path to Become a Certified Lead Auditor
Boeing 737 Max 9 Issue Reveals Important Lessons on Quality Management
The incident involving a door plug blowing off an Alaska Airlines 737 Max 9 in early January has sparked significant concern and investigations into the quality management processes at Boeing. The Federal Aviation Administration (FAA) grounded 171 other 737 Max 9s and initiated an audit of the aircraft's production line, emphasizing the critical need for verification during the … [Read more...] about Boeing 737 Max 9 Issue Reveals Important Lessons on Quality Management
Forum Discussion: What are the Requirements for Products and Services in ISO 9001?
The discussion in the Elsmar Cove Quality Forum revolves around a member's struggle with clauses 8.2.2 and 8.2.3 of a quality management standard following a major issue raised by an auditor. The primary concern was the need for more objective evidence of contract review within the organization. Participants in the forum shared insights and suggestions on addressing this issue, … [Read more...] about Forum Discussion: What are the Requirements for Products and Services in ISO 9001?
How To Choose Which Factory Audit You Need?
Choosing the right factory audit is crucial for importers to evaluate potential suppliers' reliability, capabilities, and risks. Given the variety of factory audits available, making the right selection depends on several factors, including the possibility of conducting an on-site audit, the supplier's willingness to be audited, and the specific aspects the buyer wishes to … [Read more...] about How To Choose Which Factory Audit You Need?
Five core practices for Operational Excellence (OpEx)
Benjamin Taylor's article outlines the essence of Operational Excellence (OpEx) and its reliance on people-centric approaches. The piece humorously begins by depicting managers' selective attention to OpEx principles, often overlooking the crucial chapter on Respect For People. However, Taylor emphasizes that at the Operational Excellence Summit in Hamburg, a resounding theme … [Read more...] about Five core practices for Operational Excellence (OpEx)
Artificial Intelligence in Manufacturing
This article highlights the transformative impact of Artificial Intelligence (AI) and Machine Learning (ML) in the manufacturing sector, particularly within the context of Smart Manufacturing (SM). It delves into how AI and ML technologies enhance productivity, precision, and performance in manufacturing operations. AI is depicted as a broad set of software systems capable of … [Read more...] about Artificial Intelligence in Manufacturing
Can You Still Fail With a Quality System?
Boeing has experienced challenging incidents over the past year, highlighting potential weaknesses within its Quality system. Various issues, ranging from lost wheels and cracked cockpit windows to engine fires across different flights and aircraft models, including the 737 MAX series, have raised concerns about the effectiveness of Boeing's quality management and safety … [Read more...] about Can You Still Fail With a Quality System?
Quality Manager Interview Questions for 2024
This article by Lucy Brown serves as a comprehensive guide for candidates preparing for a Quality Manager position, emphasizing the importance of showcasing technical expertise, leadership, problem-solving skills, and adaptability in the quality management domain. It outlines a structured interview preparation approach, presenting a range of questions from beginner to advanced … [Read more...] about Quality Manager Interview Questions for 2024
Data Protection and Recovery: A Foundation to a Cyber Readiness Plan
The whitepaper on "Data Protection and Recovery: A Foundation to a Cyber Readiness Plan" emphasizes the growing sophistication of ransomware and malware attacks, which pose significant economic threats to businesses. The document highlights the need for a new approach to cybersecurity, particularly in protecting information management systems and data. It underscores the … [Read more...] about Data Protection and Recovery: A Foundation to a Cyber Readiness Plan
Key reasons third-party risk management programs fail
John P. Mello Jr.'s article discusses organizations' prevalent challenges in managing third-party cybersecurity risks and offers insights into developing an effective risk management program. According to a Gartner report, over 80% of organizations have encountered business disruptions due to third-party issues in the past two years, highlighting the importance yet difficulty … [Read more...] about Key reasons third-party risk management programs fail
Cybersecurity Risk Management: Frameworks, Plans, & Best Practices
This article by Mark Knowles discusses the complexities and challenges of managing cybersecurity risks in today's digital environment. The article acknowledges the increasing difficulty of maintaining secure and compliant architectures and systems. Cybersecurity consultant Dave Hatter highlights how digitizing business and personal information has amplified risks. The … [Read more...] about Cybersecurity Risk Management: Frameworks, Plans, & Best Practices
How to Use ISO 27001 to Manage Cyber Attacks
Points that will be covered during this episode and then discussed further in subsequent episodes, include:A well-designed system requires that you identify potential sources of a security breach,mitigate them and provide a strong ongoing defense system for your information. An attack will happen – it’s not a case of ‘if’ it’s a matter of ‘when’.It’s virtually impossible to … [Read more...] about How to Use ISO 27001 to Manage Cyber Attacks
Security Assessment for an IoT-Based System
This article from QASource highlights the critical importance of security in the rapidly growing Internet of Things (IoT) market. With projections indicating significant growth in the IoT sector, the need for comprehensive security measures to protect data and services managed by IoT devices has become paramount. The article emphasizes the complexities of IoT architectures, … [Read more...] about Security Assessment for an IoT-Based System
Demystifying ISO 27701: A Comprehensive Guide for Data Privacy Management
This article sheds light on the significance of ISO 27701 in data privacy management. ISO 27701, in particular, extends the principles of ISO 27001, which concentrates on information security, to include data privacy aspects. This standard is designed to help organizations manage and protect personally identifiable information (PII) effectively, ensuring compliance with privacy … [Read more...] about Demystifying ISO 27701: A Comprehensive Guide for Data Privacy Management
Mastering NIST Penetration Testing: Your Essential Guide to Robust Cybersecurity
This article emphasizes the importance of penetration testing in strengthening an organization's cybersecurity defenses. It outlines the National Institute of Standards and Technology (NIST) Penetration Testing Framework, which provides a structured approach to security assessments, helping organizations protect against potential threats. The framework comprises four key … [Read more...] about Mastering NIST Penetration Testing: Your Essential Guide to Robust Cybersecurity
Improving Enterprise Patching for General IT Systems
This NIST publication addresses the critical challenge of patch management in cybersecurity. Authored by experts from the National Cybersecurity Center of Excellence (NCCoE) at NIST and collaborators from various organizations, including Microsoft and The MITRE Corporation, the publication provides practical guidance for enhancing patching practices within IT systems.The … [Read more...] about Improving Enterprise Patching for General IT Systems
Getting Started With Passkeys, One Service at a Time
This article by Robert Lemos discusses the growing momentum of passkeys, a technology designed to replace traditional passwords for logging into websites and cloud services. Major technology companies like Apple, Google, Microsoft, and third-party password providers such as 1Password and Bitwarden have embraced passkeys. This widespread adoption is in response to the … [Read more...] about Getting Started With Passkeys, One Service at a Time
IBM’s Cost of a Data Breach Report 2023 finds the average cost of a data breach at $4.45 million
IBM Security's 2023 Cost of a Data Breach Report provides critical insights for IT, risk management, and security leaders. The report analyzed data from 553 organizations across 16 countries and regions and 17 industries that experienced data breaches between March 2022 and March 2023. This year's report introduces new areas of exploration, including how breaches are … [Read more...] about IBM’s Cost of a Data Breach Report 2023 finds the average cost of a data breach at $4.45 million