Author Archives: Admin

Privacy Impact Assessment

For Good Information Sources for Privacy Impact Assessment (PIA), please have a look at ico.org.uk’s PIA page and Guide Conducting privacy impact assessments code of practice. Steps Identify the need for a PIA Describe the information flows Identify the privacy … Continue reading

Posted in ICT Regulation, Privacy, Security Management, Security Training, Awareness and Reports | Comments Off on Privacy Impact Assessment

Cloud Service Level Agreement Standardisation Guidelines, by C-SIG (europe)

Interesting document “Cloud SLA standardization guidelines” is available at the Digital Agenda for Europe site. The work has been done by the C-SIG (Cloud Select Industry Group) subgroup, and they are contributing this as input for the new standard ISO/IEC … Continue reading

Posted in Cloud Standards, ICT Leadership and Management, ICT Standards, Privacy, Security Standardization and Practises | Comments Off on Cloud Service Level Agreement Standardisation Guidelines, by C-SIG (europe)

Cyber Security radar (dashboard) and other online threat level indicators

There are some online resources indicating the current threat level related to cyber security. Radar is explained here. Cyber Security Index by SecureWorks Threat Meter by VeriSign AlertLevel by CERT-EU “number of cases” Infocon as part of Dashboard by SANS … Continue reading

Posted in Cybersecurity, Protection, Risk Management, Security Incidents and Cases, Security Threats | Comments Off on Cyber Security radar (dashboard) and other online threat level indicators

State of the Internet Report by Akamai

Akamai is publishing State of Internet Report (quaterly) which is worth to have a look. The latest is report from Q1 2014.

Posted in Security Management, Security News, Security Threats | Comments Off on State of the Internet Report by Akamai

Tip, creating PDF file from pictures

Problem: How to create PDF file from a list of pictures in a folder Solution: Use IrfanView function “Create multipage PDF file” Solution Alternative: Use PDFill (was much slower) Step 1: Resize and Crop images as needed by using menu: … Continue reading

Posted in Basic Tools, For Fun or Interest, Hobbies and Other Interests, Tips | Comments Off on Tip, creating PDF file from pictures

Publicly available ISO standards: security & privacy related

It is good to know that some freely available ISO standards are related to security and privacy (Reference: Publicly Available Standards). For example ISO 27000 and ISO 29100 are freely available. Security Management ISO 27000 Information security management systems – … Continue reading

Posted in Security Management, Security Standardization and Practises, Security Terminology, Security Training, Awareness and Reports | Comments Off on Publicly available ISO standards: security & privacy related

Report on Cybersecurity Black Market, by RAND and Juniper

RAND has published an interesting report on the cybersecurity black market. This report “Markets for Cybercrime Tools and Stolen Data” was sponsored by Juniper . (direct link to pdf). This report is good reading for any security professional, worth to … Continue reading

Posted in Cloud Security, Cybersecurity, ICT Leadership and Management, Risk Management, Security Management, Security Threats, Security Training, Awareness and Reports | Comments Off on Report on Cybersecurity Black Market, by RAND and Juniper