Latest Post
More Articles
The Trust Equation: How Digital Trust Fuels Data Privacy
01/06/2024
Written by : Lionel Seaw
‘Shift Left’ Responsible AI: Conditions for a Responsible AI Practice (Part 2/2)
23/04/2024
Written by : Huang Yi Jen
‘Shift Left’ Responsible AI: What is Responsible AI? (Part 1/2)
16/04/2024
Written by : Huang Yi Jen
Ciphered Shadows – Cyberforensics from Reel to Real
12/03/2024
Written by : Luqman Haniff
ITIL and DevOps: Better Together Webinar
20/02/2024
ITIL + DevOps = Business Success! Watch this webinar & unlock the power of this dynamic duo. Learn how VSM helps bridge the gap & optimize IT.
Fortress or Fragile House? Why You Need Cybersecurity Built into Your IT Service Management
15/01/2024
Written by : Lionel Seaw
Differentiate Yourself with the CAPM® Certification
02/11/2023
Written by : Hoon Wee Tan
A Career in Cybersecurity – Your Blueprint to an Exciting and Impactful Career
17/08/2023
Written by : Lionel Seaw
Scaling the Peaks: CISSP vs CISM – Choosing the Right Certification Path
07/07/2023
Written by : Luqman Haniff
Comparing CISSP vs CCSP – Unleashing the Power of Two Leading Cybersecurity Certifications
17/04/2023
Written by: Huang Yi-Jen
Studying ITIL 4 beyond Foundation level: building careers and improving business
22/03/2023
Written by: Feisal Ismail
Is The Three Lines of Defence (3LD) model applicable to your organisation?
06/12/2022
Written by : Luqman Haniff