Explaining Mass Assignment Vulnerabilities 25 Jan 2022 Programming frameworks have gained popularity due to their ability to make software development easier than using the underlying... Read more
How to prevent ransomware attacks 21 Jan 2022 Ransomware prevention is always better than recovering after an attack. In this article, we highlight 8 ways to... Read more
US states taking ESG legislation into their own hands 21 Jan 2022 Companies Prepare to Navigate Raft of New Laws Promoting Social and Environmental Supply Chain Transparency. Read more
What Does ‘good’ supply chain ESG look like 14 Dec 2021 There is an increasing push for businesses to implement more robust, end-to-end ESG practices across their supply chains,... Read more
What is the Log4Shell vulnerability and how can you... 13 Dec 2021 What is the Log4Shell Vulnerability and how can you protect against it? Read more
CMMC 2.0: it's not an admission of defeat, but... 9 Dec 2021 CMMC 2.0 makes the process of getting compliant easier and more efficient Read more
Bug Bounty vs pen testing - what's the difference? 30 Nov 2021 Bug Bounty and penetration testing both contribute uniquely to your cyber security. To use one without the other... Read more
COP26 – did Glasgow meet the standard? 22 Nov 2021 Having dominated the headlines for weeks, COP26 has come to an end in Glasgow. LRQA takes a look... Read more
What is ransomware and how does it work? 19 Nov 2021 Businesses must step up to protect themselves from ransomware attacks. Prevention is far better than cure. Find out... Read more
Five things we’ve learnt about the future of digital... 4 Nov 2021 LRQA customers and our global audit and inspection team share their insights into the future of digital audits. Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*