Category Archives: Cybersecurity

OpenWrt, an alternative for improving network security at home with firewall and web proxy

Introduction OpenWrt is a Linux distribution that can be loaded into many wireless routers by replacing the original firmware with OpenWrt firmware. The picture below shows 2 such routers, together with Raspberry Pi on the right for comparison. My interest … Continue reading

Posted in Anvanced Tools, Cybersecurity, DIY, For Fun or Interest, Hobbies and Other Interests, Internet of Things and M2M, Network Monitoring, Recommended Free Tools, Security Training, Awareness and Reports, Tips, Tools, Troubleshooting | Comments Off

Recommended Book: The Complete Book of Data Anonymization

I was getting started to search for information about data anonymization and preparing to took a time to do “yet another internet search” for information sources; until I happened to find this book. I was positively surprised that it did … Continue reading

Posted in Books, Cloud Security, Cybersecurity, ICT, ICT Books, Security Management, Security Standardization and Practises, Security Terminology | Comments Off

2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM

From IBM X-Force Research page IBM is proud to sponsor the tenth annual Cost of Data Breach Study, the industry’s gold-standard benchmark research independently conducted by Ponemon Institute. This is another interesting source of information when comparing your organization to … Continue reading

Posted in Cybersecurity, ICT Leadership and Management, Security Management, Security Training, Awareness and Reports | Comments Off

Cyber essentials

Cyber Essentials scheme is one of the actions under the UK Government policy “Keeping the UK safe in cyber space“. The Cyber Essentials scheme has been developed by Government and industry to fulfil two functions. It provides a clear statement … Continue reading

Posted in Cybersecurity, ICT Regulation, Risk Management, Security Certifications, Security Standardization and Practises | Comments Off

Cyber Security radar (dashboard) and other online threat level indicators

There are some online resources indicating the current threat level related to cyber security. Radar is explained here. Cyber Security Index by SecureWorks Threat Meter by VeriSign AlertLevel by CERT-EU “number of cases” Infocon as part of Dashboard by SANS … Continue reading

Posted in Cybersecurity, Protection, Risk Management, Security Incidents and Cases, Security Threats | Comments Off

Report on Cybersecurity Black Market, by RAND and Juniper

RAND has published an interesting report on the cybersecurity black market. This report “Markets for Cybercrime Tools and Stolen Data” was sponsored by Juniper . (direct link to pdf). This report is good reading for any security professional, worth to … Continue reading

Posted in Cloud Security, Cybersecurity, ICT Leadership and Management, Risk Management, Security Management, Security Threats, Security Training, Awareness and Reports | Comments Off

Good to Know, Critical Controls for Effective Cyber Defense

Often referred as “SANS Twenty Critical Security Controls for Effective Cyber Defense“, is a collection of controls which are believed to have the greatest impact in improving risk posture against real-world threats. There is no shortcut or “miracle medicin” when … Continue reading

Posted in Cybersecurity, SANS, Security Management, Security Organizations, Security Training, Awareness and Reports, Tips | Comments Off