Blog Overview



7da1dc7c-b844-4d65-8e85-152a3b8989fa.jpgOverview of all my blog posts on WORLDPRESS

1)             Digital Transformation approach

2)             Free-consultancy

3)            Job seekers be aware…

4)             Cybersecurity, a top priority for businesses

5)             Covid 19, The dividing of the UAE

6)            The bad side of job hunting

7)             Hi Friend and Colleagues

8)             Recruiters be more aware…

9)             Hiring managers are too picky with what they want

10)           Cybersecurity is not an on/off switch

11)           Cybersecurity threats facing Financial Services

12)            Special report: Inside the UAE’s secret hacking team of the US Mercenaries

13)           Video Pitch Prof. Dr. Ir. Henk Jan Jansen

14)           Covid 19 5th update

15)           Covid 19 4th update

16)           Covid 19 3rd update

17)           Covid 19-2nd update

18)           Covid-19-update

19)            Covid 19

20)          Awareness of cyber risks

21)          Is LinkedIn no longer a “Social Network”

22)           Video Pitch Prof. Dr. Ir. Henk Jan Jansen

23)           Were they even talking about the Covid-19 virus?

24)           Are there any positive sides of COVID-19?

25)           Cyber Security landscape in the UAE

26)           Initiative for a Framework for National Cyber Security Awareness (NCSA)

27)           Cybersecurity Threats Facing Financial Services

28)           Penny for your thoughts

29)           WHY IS WHATSAPP OR ANY OTHER VOIP CALL UNAVAILABLE IN UAE?

30)           Clickshare, a Barco presentation tool can be abused by hackers

31)           Reaching out to you

32)           The Big List of Information Security Vulnerabilities

33)           IT Security Vulnerability vs Threat vs Risk: What are the Differences?

34)           Minimizing the Risks to Your Business Using Security Measures and Disaster Planning

35)           Employee of the year 2016

36)           PRIVACY AND DATA PROTECTION IN THE UAE

37)           Let us help you with your GDPR Needs…

38)           No GDPR Compliancy yet, then read how to get compliant…

39)           Best way to reduce cost for your recruiting needs?

40)           Great confusion when you talk or think about the security of your infrastructure

41)           So, you want to be a security engineer?

42)           How to Think Like an Attacker

43)           Different Security Models

44)           Today I learned something new about GDPR

45)           Questions I got the last four weeks about GDPR/DSGVO/AVG

46)           GDPR, basically you are just to late…

47)           Available for New Freelance Roles

48)           Don’t believe everything you hear about the GDPR

49)           When GDPR knocking at your doorstep….

50)           Who Needs Agile…

51)           Soon it is no longer possible to find the owner of a website

52)           THE ISO 27000 (ISO 27K) SERIES

53)           Why ISO 27001 is not enough

54)           Hi friends and colleagues,

55)           How to Block Those ANNOYING Banner Ads

56)           Trump: FBI ‘totally unable’ to stop leaks

57)           Awareness of Cyber risks

58)           Analytics, The Smart Way…

59)           Compliance Expectations of the Unexpected

60)           GOING TO RSA 2017? -WATCH OUT FOR THE SANDMAN

61)           P@ssport Triple A- Aggressive Cyber Defense

62)           Portfolio

63)           GDPR Solution, The Smart Way…

64)           Accelerate Your Response to EU General Data Protection Regulation the Smart Way…

65)           Cyber Resilience It’s not a fairytale but reality…

66)           The Evolution of PM & Scrum

67)           How secure is your company?

68)           Have you ever wondered…?

69)           No 100% awareness of Cyber and Data Security within many companies worldwide

70)           Trust Is a Necessity, Not a Luxury

71)           The SANS 20 Critical Security Controls

72)           What are the SANS 20 Critical Security Controls

73)           Lack of Cyber Security

74)           The ‘Triple A’ Security Approach

75)           The Internet of Things is dangerous!

76)           Security and free Analytical Software

77)           Innovations, Awareness and anticipating on Security threat’s

78)           Types of Hackers

79)           Finance a Hacker

80)           Social media dos and don’ts: What you need to know

81)           Parsing The 20 Critical Security Controls

82)           Data protection Overview of the General Data Protection Regulation (GDPR)

83)           Die Entstehung von Triple A Vorbeugende Cyber Risk Management

84)           NIS Directive Introducing New Cyber-Security Requirements in the EU

85)           European NIS Directive and German IT Security Act: New Legal Requirements for Operators of Essential Infrastructure

86)           SANS Top 20 Critical Security Controls and SSH

87)           EU CYBERSECURITY STANDARDS IN CRITICAL BUSINESS SECTORS AND DIGITAL SERVICES