Category Archives: Security Threats

USB KM switch for sharing Keyboard, Mouse, clipboard and transfer files

With this special USB cable, it is possible to use one Keyboard and Mouse to work with 2 computers (and with 2 screens). In addition, one can transfer files and share the clipboard. In Wikipedia, it is called “Easy Transfer … Continue reading

Posted in Anvanced Tools, Gadgets, Security Threats, Tests, Tips | Comments Off on USB KM switch for sharing Keyboard, Mouse, clipboard and transfer files

Insider Threat Report, 2015 by Vormetric

Vormetric has published a set of documents as part of the Vormetric 2015 Insider Threat Report. The research has been conducted by Harris Poll and analyzed by Ovum. Some short extracts are shown below. Worth to have a look. The … Continue reading

Posted in Cloud Security, Risk Management, Security Management, Security Threats, Security Training, Awareness and Reports | Comments Off on Insider Threat Report, 2015 by Vormetric

Global heatmap, by G4S Risk Consulting

Global Intelligence System (GIS) is providing an online service, including a Heatmap and Global forecast reports. There are forecast reports freely available, and they can provide short and concise information about current threats and hazards globally. Please see the links … Continue reading

Posted in Security Incidents and Cases, Security Organizations, Security Threats | Comments Off on Global heatmap, by G4S Risk Consulting

Unintentional Insider Risk, report by Ponemon

Raytheon has published an interesting report called “The Unintentional Insider Risk in United States and German Organizations“, conducted by Ponemon Institute. Worth to have a look. Some highlights: IT practitioners agree unintentional employee negligence causes more security incidents than intentional … Continue reading

Posted in ICT Leadership and Management, Security Management, Security Threats | Comments Off on Unintentional Insider Risk, report by Ponemon

“Tiger in the cage” examples, bow-tie analysis as part of risk assessment

Bowtie analysis might be an helpfull tool for risk assessment. I used yEd to create my own bowtie (see the source at the end). Bow tie analysis in the ISO 31010. Bow tie analysis is a simple diagrammatic way of … Continue reading

Posted in Basic Tools, DIY, Security Management, Security Threats, Security Training, Awareness and Reports, Tests, Tips, Tools | Comments Off on “Tiger in the cage” examples, bow-tie analysis as part of risk assessment

Global Risks Report by World Economic Forum

The latest Global Risks Report 2015 by World Economic Forum is available . The report is based on an annual Global Risks Perception Survey. This is in interesting report and can be usefull when comparing different risks and when trying … Continue reading

Posted in ICT Leadership and Management, Risk Management, Security Management, Security Threats | Comments Off on Global Risks Report by World Economic Forum

POS malware, some links to material

Increasing number of attacks has been taken against Point of Sales devices and systems. There are several good overviews and materials on this topic, and those are revealing details of the technics used in these targeted attacks. Main sources PoS … Continue reading

Posted in Risk Management, Security Incidents and Cases, Security Management, Security News, Security Threats, Security Training, Awareness and Reports | Comments Off on POS malware, some links to material