Category Archives: Cybersecurity

Recommended Book:Enterprise Cybersecurity

I was positively surprised about this book “Enterprise Cybersecurity“, and I can happily recommend it to anyone working with security management. There are more than one way to do the things, and this book is showing one alternative way on … Continue reading

Posted in Cybersecurity, ICT Books, ICT Leadership and Management, Risk Management, Security Management | Comments Off

Study report “Women in Cybersecurity”, by several co-authors

It is worth to have a look at the recent study report called The 2017 Global Information Security Workforce Study: Women in Cybersecurity. It can be found at the research page od the the Center for Cyber Safety and Education, … Continue reading

Posted in Cybersecurity, ICT Leadership and Management, Security News, Security Training, Awareness and Reports | Comments Off

OpenWrt, an alternative for improving network security at home with firewall and web proxy

Introduction OpenWrt is a Linux distribution that can be loaded into many wireless routers by replacing the original firmware with OpenWrt firmware. The picture below shows 2 such routers, together with Raspberry Pi on the right for comparison. My interest … Continue reading

Posted in Anvanced Tools, Cybersecurity, DIY, For Fun or Interest, Hobbies and Other Interests, Internet of Things and M2M, Network Monitoring, Recommended Free Tools, Security Training, Awareness and Reports, Tips, Tools, Troubleshooting | Comments Off

Recommended Book: The Complete Book of Data Anonymization

I was getting started to search for information about data anonymization and preparing to took a time to do “yet another internet search” for information sources; until I happened to find this book. I was positively surprised that it did … Continue reading

Posted in Books, Cloud Security, Cybersecurity, ICT, ICT Books, Security Management, Security Standardization and Practises, Security Terminology | Comments Off

2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM

From IBM X-Force Research page IBM is proud to sponsor the tenth annual Cost of Data Breach Study, the industry’s gold-standard benchmark research independently conducted by Ponemon Institute. This is another interesting source of information when comparing your organization to … Continue reading

Posted in Cybersecurity, ICT Leadership and Management, Security Management, Security Training, Awareness and Reports | Comments Off

Cyber essentials

Cyber Essentials scheme is one of the actions under the UK Government policy “Keeping the UK safe in cyber space“. The Cyber Essentials scheme has been developed by Government and industry to fulfil two functions. It provides a clear statement … Continue reading

Posted in Cybersecurity, ICT Regulation, Risk Management, Security Certifications, Security Standardization and Practises | Comments Off

Cyber Security radar (dashboard) and other online threat level indicators

There are some online resources indicating the current threat level related to cyber security. Radar is explained here. Cyber Security Index by SecureWorks Threat Meter by VeriSign AlertLevel by CERT-EU “number of cases” Infocon as part of Dashboard by SANS … Continue reading

Posted in Cybersecurity, Protection, Risk Management, Security Incidents and Cases, Security Threats | Comments Off