Sustainable food must be safe food - finding the... 15 Feb 2022 Kimberly Coffin discusses why making food safe and making food sustainable are two different challenges that require different... Read more
Cloud native security- what you need to know 12 Feb 2022 What does Cloud Native security really mean? And how can you implement an effective Cloud Native strategy? Find... Read more
Tomorrow’s food safety auditor: new skills & capabilities 10 Feb 2022 Growing use of technology in food safety has led to a change to the key skills for a... Read more
Firewall penetration testing: what it entails 28 Jan 2022 Firewalls provide critical defence against malicious users. Our penetration testing services can assess your system's configuration for peak... Read more
Explaining Mass Assignment Vulnerabilities 25 Jan 2022 Programming frameworks have gained popularity due to their ability to make software development easier than using the underlying... Read more
How to prevent ransomware attacks 21 Jan 2022 Ransomware prevention is always better than recovering after an attack. In this article, we highlight 8 ways to... Read more
US states taking ESG legislation into their own hands 21 Jan 2022 Companies Prepare to Navigate Raft of New Laws Promoting Social and Environmental Supply Chain Transparency. Read more
What Does ‘good’ supply chain ESG look like 14 Dec 2021 There is an increasing push for businesses to implement more robust, end-to-end ESG practices across their supply chains,... Read more
What is the Log4Shell vulnerability and how can you... 13 Dec 2021 What is the Log4Shell Vulnerability and how can you protect against it? Read more
CMMC 2.0: it's not an admission of defeat, but... 9 Dec 2021 CMMC 2.0 makes the process of getting compliant easier and more efficient Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*