Skip content
Insights

The latest opinions from our industry experts.

Insights, reports and opinions from LRQA experts.

The latest opinions from our industry experts.

311 320 530 results

  • Learning the difference between vulnerability testing vs. Penetration testing

    This blog post aims to explain what vulnerability and penetration testing are and then define the difference between...

    Read more
  • Vincenzo Patti: Are you ready for remote?

    Vincenzo Patti from LRQA answers your questions about remote auditing – what it is, what the advantages are...

    Read more
    Remote audit
  • Connecting remotely. Anytime. Anywhere.

    Remote assurance means connecting technical experts with organisations to conduct an audit or inspection in a safe, flexible...

    Read more
    Remote Assurance
  • How to configure your Identity and Access Management controls...

    Unconfigured Identity and Access Management controls could be catastrophic to your system security. Read on to understand the...

    Read more
  • CVE-2019-13021, 22, 23: JETSELECT Network Segregation Application

    Nettitude are disclosing three vulnerabilities discovered as part of a security assessment on board a superyacht. These vulnerabilities...

    Read more
  • How to identify a data breach under gdpr

    Under GDPR, the key to handling data breaches is firstly knowing how to identify them.

    Read more
  • Why every disaster recovery plan needs Incident Response (IR)

    There're two key documents which growing businesses should keep regularly updated, as their IT infrastructure changes over time...

    Read more
  • Cyber security maturity assessments explained - with LRQA's senior...

    Continual improvement is the name of the game when it comes to cyber security. An evidence based assessment...

    Read more
  • Cloud series

    In today's climate, it has become easier than ever to obtain cloud technology, but is it that easy...

    Read more
  • Cyber security and the cloud series - nist cyber...

    In the latest cloud series blog post, learn about how the NIST cyber security framework can be used...

    Read more

Error

Error

No results found

No results found that match your query

Loading results