Category Archives: Security Management

Recommended Book:Enterprise Cybersecurity

I was positively surprised about this book “Enterprise Cybersecurity“, and I can happily recommend it to anyone working with security management. There are more than one way to do the things, and this book is showing one alternative way on … Continue reading

Posted in Cybersecurity, ICT Books, ICT Leadership and Management, Risk Management, Security Management | Comments Off

Six Thinking Hats, a method to talk about ideas, problems and challenges

Six Thinking Hats method can be useful when taking a discussion/workshop with several participants and at the same time you want to make sure that you will get some concrete results out of the session. This method nicely gives a … Continue reading

Posted in ICT Leadership and Management, ICT Training and Courses, Innovation and new tech, Personal Development, Security Management, Tips | Comments Off

Survey of ISO certifications, results for 2015

ISO is having surveys about number of ISO certifications, it is worth to have a look The table below is taken from the executive summary. There are also excel files available for each ISO standard that shows certifications per country … Continue reading

Posted in ICT Leadership and Management, ICT Standards, Security Certifications, Security Management, Security Standardization and Practises, Security Training, Awareness and Reports | Comments Off

Process reference model (PRM) for ISMS (ISO 27001)

ISO TS 33052:2016 “Process reference model (PRM) for information security management” is in interesting document which can be useful when evaluating the possible ways to implement the information security management system (ISMS) processes (see ISO 27001 ISMS requirements). This Technical … Continue reading

Posted in Security Certifications, Security Management, Security Standardization and Practises | Comments Off

Recommended Book: The Complete Book of Data Anonymization

I was getting started to search for information about data anonymization and preparing to took a time to do “yet another internet search” for information sources; until I happened to find this book. I was positively surprised that it did … Continue reading

Posted in Books, Cloud Security, Cybersecurity, ICT, ICT Books, Security Management, Security Standardization and Practises, Security Terminology | Comments Off

Cloud Security Spotlight Report (survey)

Yet another survey results are available in the “2016 Cloud Security Spotlight Report” and is interesting reading. slides webinar Example Applications Q: Which of the following cloud applications are deployed or will be deployed in your organization? Example Authentication Q: … Continue reading

Posted in Cloud Security, ICT Leadership and Management, Security Management | Comments Off

Android 6 and new privacy related settings

Android version 6, Marshmellow, has adopted a new run-time permission system that is available to the users. Permissions are divided into permission groups and users can modify permissions per application. It is possible to see how many applications are allowed … Continue reading

Posted in Android, Privacy, Protection, Recommended Android Applications, Security Management, Security Training, Awareness and Reports, Tips | Comments Off