Author Archives: Admin

Digital Attack Map, by Google and Arbor Networks

There is an interesting new site Digital Attack Map related to DDoS attacks. Worth to have a look! From About: Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google … Continue reading

Posted in Security Incidents and Cases, Security News, Security Threats, Security Training, Awareness and Reports | Comments Off on Digital Attack Map, by Google and Arbor Networks

Microsoft Security Intelligence Report

Security Intelligence Reports are available at Microsoft site. What it is? Microsoft Security Intelligence Report provides in-depth perspectives on software vulnerabilities in Microsoft and third-party software, exploits, malicious code threats, and potentially unwanted software. The SIR website also includes deep … Continue reading

Posted in Security Incidents and Cases, Security Management, Security Threats, Security Training, Awareness and Reports | Comments Off on Microsoft Security Intelligence Report

Electronic Communication Annual Incident Reports, by ENISA

ENISA publishes annual reports about significant incidents in the electronic communications sector. ENISA is receiving these reports from National Authorities (see figure below). The latest report from 2012 incidents is now available. In total 18 countries reported 79 significant incidents, … Continue reading

Posted in ENISA, ICT Leadership and Management, Security Incidents and Cases, Security Training, Awareness and Reports | Comments Off on Electronic Communication Annual Incident Reports, by ENISA

2013 TMT Global Security Study, by Deloitte

Deloitte is producing interesting material. For example the 2013 TMT Global Security Study and related infographic The updates for 2014 might come in the beginning of the year? Links Technology, Media & Telecommunications Technology, Media & Telecommunications Predictions 2013 TMT … Continue reading

Posted in ICT Leadership and Management, Security Management, Security News, Security Threats, Security Training, Awareness and Reports | Comments Off on 2013 TMT Global Security Study, by Deloitte

IT Law wiki, ICT related encyclopedia

In addition to wikipedia, IT Law wiki is a good complementary information site. And the content at IT law wiki is more specific to ICT. Comparison “IT Law wiki” <-> Wikipedia IT Law wiki Wikipedia Cybercrime Cybercrime Surveillance Surveillance Policy … Continue reading

Posted in Definitions, ICT Leadership and Management, ICT Terminology, Security Management, Security Terminology, Security Training, Awareness and Reports | Comments Off on IT Law wiki, ICT related encyclopedia

Application Security Weaknesses, OWASP Top 10

OWASP (Open Web Application Security Project) is maintaining top 10 list of most common application vulnerabilities/weaknesses. Injection Broken Authentication and Session Management Cross-Site Scripting (XSS) Insecure Direct Object References Security Misconfiguration Sensitive Data Exposure Missing Function Level Access Control Cross-Site … Continue reading

Posted in Security Management, Security Standardization and Practises, Security Threats, Security Training, Awareness and Reports | Comments Off on Application Security Weaknesses, OWASP Top 10

“Internet Of Thing” Comic Book

The comic book “Internet of Things” is a nice information package illustrating the Internet of Things (IOT) concept. Currently there are 3 versions (editions): Version 1 as pdf (autumn 2011) (30 MB) Special Edition page (spring 2012) from where one … Continue reading

Posted in ICT Leadership and Management, Innovation and new tech, Internet of Things and M2M | Comments Off on “Internet Of Thing” Comic Book