Q&A: The Impact of IIBA’s New BABOK Guide and PMI’s New Business Analysis for Practitioners Guide

The release of both the IIBA’s A Guide to the Business Analysis Body of Knowledge Guide v3 and the Project Management Institute’s Business Analysis for Practitioners has given business analysts a lot of information to process. To help make sense of things, Global Knowledge instructors Cheryl Lee and Adam McClellan joined forces to educate attendees on the differences between the two guides, how both guides compare to the previous version of the BABOK Guide, and where all this might be going.

Read more

Rise of the Shadow Hacker: Cisco’s Threat Assessment

Ransomware, domain shadowing and malvertising are just a few of the menacing terms you’ll need to get familiar with in order to protect your network in 2015. Cisco’s 2015 Midyear Security Report is out and it’s just the sort of reading that could give any chief information officer nightmares. The 41-page report confirms every security professional’s greatest fears: the bad guys are getting sneakier and our general ability to stop them is lagging dangerously behind.

Read more

Security+ Question of the Week: Incident Response Procedure

Which of the following is not considered an element of an incident response procedure? A. Escalation and notification B. Data breach C. Mitigation D. Incident identification Related Courses Security+ Prep Course (SY0-401) Security+ Certification Boot Camp (SY0-401)

Read more

New to IBM Business Process Manager? Bookmark this List of Common Abbreviations!

You know how whenever you start something new you have to hang out for a bit until you figure out what all the abbreviations and acronyms mean? It’s like terminology purgatory. So if you’re new to IBM BPM, take a skim through this list of common abbreviations or bookmark it so you can refer back.

Read more