Why—and How—to Hire an Outlier
As clients clamor for speedy results and headhunters increasingly rely on the latest data analytic tools, there is a danger of dull, predictable candidates being churned out for results that serve but do not shine.
As clients clamor for speedy results and headhunters increasingly rely on the latest data analytic tools, there is a danger of dull, predictable candidates being churned out for results that serve but do not shine.
This story was originally published by Knowable Magazine.
Cybersecurity is a complex topic no matter what industry vertical it is applied to. In order to reduce that complexity, it helps to frame cybersecurity in the context of the business.
Every so often an event, invention, or idea is so momentous it changes the face of entire industries. In some ways, the global response to Covid-19 has been such an event.
Shortly after a recent post, in which I referred to sowing the seeds of change, I enlisted the help of my son, Ben, to reseed a particularly bare area of our yard.
This story was originally published by Knowable Magazine.
My recent epiphany was that the lens for all work and even for everyday living during the next few years will be risk-based. Why do I make this case?
Each article in this series presents new tools for increasing return on investment (ROI), enhancing customer satisfaction, creating process excellence, and driving risk from an ISO 9001:2015-based quality management system (QMS).
If you’re among the tens of millions of people returning to work or preparing to do so after months sheltering in place, you may be worried it will put you and your family at increased risk of exposure to Covid-19.
The cyber world is relatively new, and unlike other types of assets, cyber-assets are potentially accessible to criminals in far-off locations.
© 2026 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.