Category Archives: Security Management

Process reference model (PRM) for ISMS (ISO 27001)

ISO TS 33052:2016 “Process reference model (PRM) for information security management” is in interesting document which can be useful when evaluating the possible ways to implement the information security management system (ISMS) processes (see ISO 27001 ISMS requirements). This Technical … Continue reading

Posted in Security Certifications, Security Management, Security Standardization and Practises | Comments Off

Recommended Book: The Complete Book of Data Anonymization

I was getting started to search for information about data anonymization and preparing to took a time to do “yet another internet search” for information sources; until I happened to find this book. I was positively surprised that it did … Continue reading

Posted in Books, Cloud Security, Cybersecurity, ICT, ICT Books, Security Management, Security Standardization and Practises, Security Terminology | Comments Off

Cloud Security Spotlight Report (survey)

Yet another survey results are available in the “2016 Cloud Security Spotlight Report” and is interesting reading. slides webinar Example Applications Q: Which of the following cloud applications are deployed or will be deployed in your organization? Example Authentication Q: … Continue reading

Posted in Cloud Security, ICT Leadership and Management, Security Management | Comments Off

Android 6 and new privacy related settings

Android version 6, Marshmellow, has adopted a new run-time permission system that is available to the users. Permissions are divided into permission groups and users can modify permissions per application. It is possible to see how many applications are allowed … Continue reading

Posted in Android, Privacy, Protection, Recommended Android Applications, Security Management, Security Training, Awareness and Reports, Tips | Comments Off

Insider Threat Report, 2015 by Vormetric

Vormetric has published a set of documents as part of the Vormetric 2015 Insider Threat Report. The research has been conducted by Harris Poll and analyzed by Ovum. Some short extracts are shown below. Worth to have a look. The … Continue reading

Posted in Cloud Security, Risk Management, Security Management, Security Threats, Security Training, Awareness and Reports | Comments Off

2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM

From IBM X-Force Research page IBM is proud to sponsor the tenth annual Cost of Data Breach Study, the industry’s gold-standard benchmark research independently conducted by Ponemon Institute. This is another interesting source of information when comparing your organization to … Continue reading

Posted in Cybersecurity, ICT Leadership and Management, Security Management, Security Training, Awareness and Reports | Comments Off

Cloud Information Governance: Data Security Study, by Ponemon

Safenet has sponsored a survey called “The Challenges of Cloud Information Governance: A Global Data Security Study“. The purpose of the survey is very interesting: The purpose of this research is to focus on how organizations are putting confidential information … Continue reading

Posted in Cloud Computing, Cloud Security, Security Management, Security Training, Awareness and Reports | Comments Off