{"id":2395,"date":"2021-01-17T17:12:12","date_gmt":"2021-01-17T16:12:12","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/blog-overview\/"},"modified":"2023-02-05T22:52:37","modified_gmt":"2023-02-05T21:52:37","slug":"blog-overview","status":"publish","type":"page","link":"https:\/\/hjinterim.tech\/index.php\/blog-overview\/","title":{"rendered":"Blog Overview"},"content":{"rendered":"\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Go to <a rel=\"noreferrer noopener\" href=\"https:\/\/hjinterim.wordpress.com\" data-type=\"URL\" data-id=\"https:\/\/hjinterim.wordpress.com\" target=\"_blank\">https:\/\/hjinterim.wordpress.com<\/a> for a full overview<\/mark><\/strong><\/p>\n\n\n\n<p>1) Digital Transformation approach<br>2) Free-consultancy<br>3) Job seekers be aware\u2026<br>4) Cybersecurity, a top priority for businesses<br>5) Covid 19, The dividing of the UAE<br>6) The bad side of job hunting<br>7) Hi Friend and Colleagues<br>8) Recruiters be more aware\u2026<br>9) Hiring managers are too picky with what they want<br>10) Cybersecurity is not an on\/off switch<br>11) Cybersecurity threats facing Financial Services<br>12) Special report: Inside the UAE\u2019s secret hacking team of the US Mercenaries<br>13) Video Pitch Prof. Dr. Ir. Henk Jan Jansen<br>14) Covid 19 5th update<br>15) Covid 19 4th update<br>16) Covid 19 3rd update<br>17) Covid 19-2nd update<br>18) Covid-19-update<br>19) Covid 19<br>20) Awareness of cyber risks<br>21) Is LinkedIn no longer a \u201cSocial Network\u201d<br>22) Video Pitch Prof. Dr. Ir. Henk Jan Jansen<br>23) Were they even talking about the Covid-19 virus?<br>24) Are there any positive sides of COVID-19?<br>25) Cyber Security landscape in the UAE<br>26) Initiative for a Framework for National Cyber Security Awareness (NCSA)<br>27) Cybersecurity Threats Facing Financial Services<br>28) Penny for your thoughts<br>29) WHY IS WHATSAPP OR ANY OTHER VOIP CALL UNAVAILABLE IN UAE?<br>30) Clickshare, a Barco presentation tool can be abused by hackers<br>31) Reaching out to you<br>32) The Big List of Information Security Vulnerabilities<br>33) IT Security Vulnerability vs Threat vs Risk: What are the Differences?<br>34) Minimising the Risks to Your Business Using Security Measures and Disaster Planning<br>35) Employee of the year 2016<br>36) PRIVACY AND DATA PROTECTION IN THE UAE<br>37) Let us help you with your GDPR Needs\u2026<br>38) No GDPR Compliancy yet, then read how to get compliant\u2026<br>39) Best way to reduce cost for your recruiting needs?<br>40) Great confusion when you talk or think about the security of your infrastructure<br>41) So, you want to be a security engineer?<br>42) How to Think Like an Attacker<br>43) Different Security Models<br>44) Today I learned something new about GDPR<br>45) Questions I got the last four weeks about GDPR\/DSGVO\/AVG<br>46) GDPR, basically you are just to late\u2026<br>47) Available for New Freelance Roles<br>48) Don\u2019t believe everything you hear about the GDPR<br>49) When GDPR knocking at your doorstep\u2026.<br>50) Who Needs Agile\u2026<br>51) Soon it is no longer possible to find the owner of a website<br>52) THE ISO 27000 (ISO 27K) SERIES<br>53) Why ISO 27001 is not enough<br>54) Hi friends and colleagues,<br>55) How to Block Those ANNOYING Banner Ads, Tracking Cookies, and a Lot of Adware\/malware\/trojan Downloaders from Bogging Down Your Computer.<br>56) Trump: FBI \u2018totally unable\u2019 to stop leaks<br>57) Trump: FBI \u2018totally unable\u2019 to stop leaks<br>58) Analytics, The Smart Way\u2026<br>59) Compliance Expectations of the Unexpected<br>60) GOING TO RSA 2017? -WATCH OUT FOR THE SANDMAN<br>61) P@ssport Triple A- Aggressive Cyber Defense<br>62) Portfolio<br>63) GDPR Solution, The Smart Way\u2026<br>64) Accelerate Your Response to EU General Data Protection Regulation the Smart Way\u2026<br>65) Cyber Resilience It\u2019s not a fairytale but reality\u2026<br>66) The Evolution of PM &amp; Scrum<br>67) How secure is your company?<br>68) Have you ever wondered\u2026?<br>69) No 100% awareness of Cyber and Data Security within many companies worldwide<br>70) Trust Is a Necessity, Not a Luxury<br>71) The SANS 20 Critical Security Controls<br>72) What are the SANS 20 Critical Security Controls<br>73) Lack of Cyber Security<br>74) The \u2018Triple A\u2019 Security Approach<br>75) The Internet of Things is dangerous!<br>76) Security and free Analytical Software<br>77) Innovations, Awareness and anticipating on Security threat\u2019s<br>78) Types of Hackers<br>79) Finance a Hacker<br>80) Social media dos and don\u2019ts: What you need to know<br>81) Parsing The 20 Critical Security Controls<br>82) Data protection Overview of the General Data Protection Regulation (GDPR)<br>83) Die Entstehung von Triple A Vorbeugende Cyber Risk Management<br>84) NIS Directive Introducing New Cyber-Security Requirements in the EU<br>85) European NIS Directive and German IT Security Act: New Legal Requirements for Operators of Essential Infrastructure<br>86) SANS Top 20 Critical Security Controls and SSH<br>87) EU CYBERSECURITY STANDARDS IN CRITICAL BUSINESS SECTORS AND DIGITAL SERVICES<br>88) Awareness of Cyber risks<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Go to https:\/\/hjinterim.wordpress.com for a full overview 1) Digital Transformation approach2) Free-consultancy3) Job seekers be aware\u20264) Cybersecurity, a top priority for businesses5) Covid 19, The dividing of the UAE6) The bad side of job hunting7) Hi Friend and Colleagues8) Recruiters be more aware\u20269) Hiring managers are too picky with what they want10) Cybersecurity is not &#8230; <a title=\"Blog Overview\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/blog-overview\/\">Read more<span class=\"screen-reader-text\">Blog Overview<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_theme","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-2395","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/pages\/2395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=2395"}],"version-history":[{"count":7,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/pages\/2395\/revisions"}],"predecessor-version":[{"id":3187,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/pages\/2395\/revisions\/3187"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=2395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}