Browse our site

Search for.... iso 27001 (7)

Blog

Configuration management in information security

Modern IT landscapes require the coordinated interaction of IT resources, network infrastructures, hardware and software applications and various types of services. The key to high-performance and secure operation lies in the proper configuration of all systems, components and applications involved. The new control 8.9 in information security,  "Configuration management" from the updated version ...
Blog

Corporate information security: A case study of Mubea group

Today, solid information security brings far more advantages for companies than simply securing the technical infrastructure. Entire business processes now depend significantly on it - whether it is the secure handling of sensitive data or the legally compliant processing of the same. That is why the term now encompasses the protection of the entire flow of information. Automotive supplier Mubea ...
Blog

Architecting Secure Software with ISO 27001 Controls A.8.25 – A.8.27

Software is at the heart of nearly every business operation from powering services, storing sensitive data to enabling customer interactions. But with increased reliance on software comes increased risk. Vulnerabilities introduced during development can become prime entry points for attackers, especially when security isn't baked in from the beginning.In this post we start analysing ISO/IEC 27001...
Blog

PIA vs SRAA: Which Assessment is Right for You?

“Our client asked if we’ve completed any security audits or privacy assessments. We’re a service provider for big organizations and the governments in HK—should we do PIA or SRAA first?” That was the exact question a tech company founder asked during a recent consultation. And it’s a common one. In today’s risk-driven digital environment, privacy and cybersecurity are no longer optional add-ons...
Blog

ISO/IEC 27001 in Logistics: Building Security into the Flow of Goods and Data

The way we move goods today is a world apart from how things operated a decade ago. Logistics has gone digital. Systems now talk to each other across borders. Fleets are tracked in real time. Warehouses run on data just as much as forklifts. And with that progress comes a new kind of responsibility: Keeping the information behind it all safe.If your business is part of the supply chain, whether y...
Blog

Unlocking Trustworthy AI: What You Need to Know About ISO/IEC 42001 Certification

As artificial intelligence (AI) becomes more embedded in the core of business operations, ensuring its safe, ethical and transparent use has never been more critical. This is why the launch of ISO/IEC 42001, the world’s first AI-specific management system standard, marks a milestone for organizations looking to deploy AI responsibly.DQS is among the few certification bodies offering ISO/IEC 42001...