article thumbnail

10 HR podcasts you should be listening to

cipHR

million in 2013 to 5.9 Unsurprisingly, the professional body has access to some of the biggest, best and brightest minds in HR and L&D; topics range from automation to workplace agility, unconscious bias, cyber security and performance management. million in 2018, according to statistics from Ofcom. That HR Podcast.

article thumbnail

How BAE Systems Uses High-Potential Development As a Catalyst for Professional Growth and Retention

i4cp

subsidiary of BAE Systems plc, is a top aerospace, defense and security contractor. The company delivers products and services that span electronic systems, maritime and land platforms, intelligence and support services, munitions, cyber-security, and other areas. BAE Systems Inc., From this imperative, Catalyst was born.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Workable gets ISO 27001 certification

Workable

Confident that our information security management is in line with international best practice we recently applied for independent recognition of this through the International Organisation for Standardisation (ISO). What does it mean to have ISO 27001 accreditation?

article thumbnail

Why Data Transparency is Not Enough to Protect Your Business

Lusha

2013: Adobe has hackers steal 3 million users’ credit card data. It communicates that you don’t have the security to protect your information. Protect your website with antivirus software and a secure sockets layer (SSL). For example: 2012: LinkedIn had 700 million users’ data taken and sold on the deep web.

article thumbnail

What Is Data Security in Cloud Computing?

U-Next

Although it occurred between 2013 & 2014, Yahoo didn’t disclose it until 2016. Various Data Security Courses are instructing you to build a career in cyber security to deal with practical situations. The post What Is Data Security in Cloud Computing? Yahoo Data Breach: .

Data 40
article thumbnail

Expensive Enterprise Hacks That Serve As A Lesson In Cybersecurity

U-Next

There was an infamous incident back in 2017, where the company admitted a security breach that happened in 2013. The highlight of the attack was that even the security questions that are used to add a protective layer to passwords had been breached. Photo by FLY:D on Unsplash. The Yahoo Incident Of 2017 . Remember Yahoo?

article thumbnail

“Test your Disaster Recovery Plan”, With Jason Remillard and Richard Greenberg

Thrive Global

As a part of our series about “5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity”, I had the pleasure of interviewing Richard Greenberg, CISSP, a well-known Cyber Security Leader and Evangelist, CISO, Advisor, and speaker.