News That Matters to You
This blog features the most up-to-date stories of interest to quality managers specializing in a variety of different areas including safety, environmental, IT, cannabis, and metrology. We also support the professional development needs of employees working in these areas, connecting readers with stories about training, job postings, and career development.
Categories
- Cybersecurity
- Cybersecurity-Artificial Intelligence
- Cybersecurity-Automation
- Cybersecurity-Career
- Cybersecurity-Certification Management
- Cybersecurity-Continuous Improvement
- Cybersecurity-Documentation
- Cybersecurity-ISO 27001
- Cybersecurity-Management
- Cybersecurity-Regulatory
- Cybersecurity-Risk Management
- Cybersecurity-Software
- Cybersecurity-Supplier Quality
- Cybersecurity-Sustainability
- General
- Manufacturing
- Quality-Artificial Intelligence
- Quality-Automation
- Quality-Career
- Quality-Continuous Improvement
- Quality-Cost of Quality
- Quality-Documentation
- Quality-ISO 9001
- Quality-LEAN-6 Sigma
- Quality-Product Safety
- Quality-Quality Management
- Quality-Regulatory
- Quality-Risk Management
- Quality-Root Cause
- Quality-Skills
- Quality-Software
- Quality-Supplier Quality
- Quality-Sustainability
- Safety-Product Safety Certification
- Safety-Risk Management
- Uncategorized
Hyperproof Releases 2024 IT Risk and Compliance Benchmark Report
AI in cybersecurity presents significant risks, such as enabling cyberattacks, and opportunities, such as enhancing defense mechanisms. Regulatory frameworks like NIST AI RMF are increasingly adopted to manage AI risks, with industry-specific concerns especially pronounced in sectors like banking, health tech, and aviation. Organizations use AI to optimize workflows, with 61% employing AI for control…
Continue Reading Hyperproof Releases 2024 IT Risk and Compliance Benchmark Report
What Experts Have to Say About Choosing the Right Cybersecurity Frameworks
There is no one-size-fits-all cybersecurity framework; organizations must choose one based on their specific needs and goals. Common mistakes in implementing frameworks include thinking they offer complete security and neglecting to adapt them to the organization’s structure. Multiple frameworks can be implemented together if necessary, but they should be mapped for overlap to ensure efficient…
Continue Reading What Experts Have to Say About Choosing the Right Cybersecurity Frameworks
The 5 Tests Of Controls To Verify Cybersecurity Measures
Tests of controls assess if a company’s internal controls are functioning effectively to detect risks and protect systems from cyber threats. Five primary methods for testing controls are inquiry, observation, inspection, re-performance, and computer-assisted audit techniques (CAAT). Automating control tests using platforms like Sprinto simplifies audits by automating evidence collection, reducing errors, and enhancing compliance…
Continue Reading The 5 Tests Of Controls To Verify Cybersecurity Measures
Separation Of Duties & Internal Controls: What’s The Difference?
Separation of Duties (SoD) and internal controls are crucial tools for IT managers in preventing errors, fraud, and security breaches. While internal controls provide a broad framework for safeguarding financial and operational integrity, SoD specifically focuses on distributing responsibilities to mitigate risk. Effective implementation of both SoD and internal controls strengthens accountability, enhances transparency, and…
Continue Reading Separation Of Duties & Internal Controls: What’s The Difference?
Defense Department Publishes Proposed Rule requiring contractors working with the federal government to implement cybersecurity requirements
Federal contractors should closely follow the developments of this proposed rule, as compliance with the Cybersecurity Maturity Model Certification (CMMC) 2.0 program will be required for future contracts. The rule is progressing, with a comment period open until October 15, 2024, signaling that implementation is moving forward. A key element of the proposed rule is…
From Trust to Security: Third-party Risk Management Strategies and Challenges
Third-party risk management is increasingly challenging for organizations due to the complexity of managing numerous external partners, with over half of respondents having experienced a third-party security breach in the past year. Many companies lack sufficient visibility into the security practices of their third- and fourth-party partners, which heightens vulnerability to breaches and hinders effective…
Continue Reading From Trust to Security: Third-party Risk Management Strategies and Challenges
Get our latest post in your inbox.
Join my newsletter to receive our latest long-form content right in your inbox. I also offer up discounts, coupons, and exclusive content to our subscribers. Join today!