Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html . Safer Internet Day 2020 – Save the date!. Safer Internet Day (SID) is organised by Insafe in February of each year to […]
. . Let us talk about Hygiene… Strange, I make an introduction about Hygiene in an Cyber-Security Blog, ISN’T it?!! Well, there is a reason […]
. Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html . Safer Internet Day 2019 – Save the date!. Safer Internet Day (SID) is organised by Insafe in February of each […]
Successful organizations understand that training content is intellectual property and it is critical to design and implement a strategy that secures it. Whether that’s establishing […]
Successful organizations understand the importance of leveraging different learning technologies to meet the growing demands of today’s tech-savvy workforce by providing instant access to information […]
. . Luxembourg and Cyber-Security: HOW did it START? . Luxembourg, a tiny country with ONLY 590.667 inhabitants (January 2017) in the heart of […]
. . NEW Words, Trends to Know and to LEARN about in 21st Century Are YOU feeling overwhelmed with strange words, NEW trends, when you […]
Conferences are ideal locations for gathering business intelligence about a specific industry. There are presentations revealing the latest thinking in the field, and exhibitors want […]
. Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html . Safer Internet Day 2017 – Save the date!. Safer Internet Day (SID) is organised by Insafe in February of each year […]
Successful organizations understand the importance of leveraging different learning technologies to meet the growing demands of today’s tech-savvy workforce by providing instant access to information […]
Successful organizations understand that training content is intellectual property and it is critical to design and implement a strategy that secures it. Whether that’s establishing […]
In the wake of an apocalypse targeting our mobile devices, we need anti-virus programs, secure firewalls, toolkit detection, and of course, a flamethrower. The post […]