Author Archives: Admin
Global Information Security Workforce Study, by ISC2
ISC2 is publishing yearly “Global Information Security Workforce Study” in co-operation with Frost & Sullivan. The 2013 revision is available here. It provides several graphics, and therefore it is easy to browse through the material. There is also a short … Continue reading
Common Sense Guide to Mitigating Insider Threats
Software Engineering Institute has published the latest revision of the “Common Sense Guide to Mitigating Insider Threats“. It is good reading for any security manager, and provides 19 practises that each organization should implement. Definition Malicious insider is defined as … Continue reading
Mandiant Intelligence Center Report 2013
Surveillance, cybersecurity… These are Hot topics today. As a information security professional, it is good to know that there are several reports available. Please use your own judgement and conclusions when reading these reports. What this is about? What it … Continue reading
Guides for Time Management Matrix
Time Management matrix is a good tool to focus on effectiveness. Sometimes the reference is made to Eisenhower, and sometimes to Stephen Covey. Time Management Urgent Not Urgent Important Do first Schedule Not Important Delegate Don’t do Good videos explaining … Continue reading
Guides for Personal Mission Statement
What is Personal Mission Statement? I like the following definition: Mission Statement is a sentence or short paragraph which is written by a person and reflects their objectives, identity, values and principle aims. Vision Statements is a sentence or short … Continue reading
PDFill “PDF Tools”, tool for manipulating PDF files
PDFill PDF Tools is a good alternative for various operations on pdf files. It contains more features than PDFsam which I have listed earlier. Especially it can encrypt/decrypt, add text or image watermarks etc. (However, licensing is different than in … Continue reading
Notes on Cryptocurrency: Bitcoin
Cryptocurrency (wikipedia): A cryptocurrency is a type of digital currency that relies on cryptography Cryptocurrencies are peer-to-peer and decentralized, and are currently all based on the first cryptocurrency, Bitcoin. Cryptocurrencies are designed to ensure that funds can neither be frozen … Continue reading