Tomorrow’s food safety auditor: new skills & capabilities 10 Feb 2022 Growing use of technology in food safety has led to a change to the key skills for a... Read more
Firewall penetration testing: what it entails 28 Jan 2022 Firewalls provide critical defence against malicious users. Our penetration testing services can assess your system's configuration for peak... Read more
Explaining Mass Assignment Vulnerabilities 25 Jan 2022 Programming frameworks have gained popularity due to their ability to make software development easier than using the underlying... Read more
How to prevent ransomware attacks 21 Jan 2022 Ransomware prevention is always better than recovering after an attack. In this article, we highlight 8 ways to... Read more
US states taking ESG legislation into their own hands 21 Jan 2022 Companies Prepare to Navigate Raft of New Laws Promoting Social and Environmental Supply Chain Transparency. Read more
What Does ‘good’ supply chain ESG look like 14 Dec 2021 There is an increasing push for businesses to implement more robust, end-to-end ESG practices across their supply chains,... Read more
What is the Log4Shell vulnerability and how can you... 13 Dec 2021 What is the Log4Shell Vulnerability and how can you protect against it? Read more
CMMC 2.0: it's not an admission of defeat, but... 9 Dec 2021 CMMC 2.0 makes the process of getting compliant easier and more efficient Read more
Bug Bounty vs pen testing - what's the difference? 30 Nov 2021 Bug Bounty and penetration testing both contribute uniquely to your cyber security. To use one without the other... Read more
COP26 – did Glasgow meet the standard? 22 Nov 2021 Having dominated the headlines for weeks, COP26 has come to an end in Glasgow. LRQA takes a look... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*