Category Archives: Security

Common Sense Guide to Mitigating Insider Threats

Software Engineering Institute has published the latest revision of the “Common Sense Guide to Mitigating Insider Threats“. It is good reading for any security manager, and provides 19 practises that each organization should implement. Definition Malicious insider is defined as … Continue reading

Posted in Security Management, Security Standardization and Practises, Security Training, Awareness and Reports | Comments Off on Common Sense Guide to Mitigating Insider Threats

Mandiant Intelligence Center Report 2013

Surveillance, cybersecurity… These are Hot topics today. As a information security professional, it is good to know that there are several reports available. Please use your own judgement and conclusions when reading these reports. What this is about? What it … Continue reading

Posted in Cybersecurity, Security Incidents and Cases, Security Training, Awareness and Reports | Comments Off on Mandiant Intelligence Center Report 2013

PDFill “PDF Tools”, tool for manipulating PDF files

PDFill PDF Tools is a good alternative for various operations on pdf files. It contains more features than PDFsam which I have listed earlier. Especially it can encrypt/decrypt, add text or image watermarks etc. (However, licensing is different than in … Continue reading

Posted in Anvanced Tools, Recommended Free Tools, Security Products and Solutions | Comments Off on PDFill “PDF Tools”, tool for manipulating PDF files

Notes on Cryptocurrency: Bitcoin

Cryptocurrency (wikipedia): A cryptocurrency is a type of digital currency that relies on cryptography Cryptocurrencies are peer-to-peer and decentralized, and are currently all based on the first cryptocurrency, Bitcoin. Cryptocurrencies are designed to ensure that funds can neither be frozen … Continue reading

Posted in Security Threats, Security Training, Awareness and Reports | Comments Off on Notes on Cryptocurrency: Bitcoin

Big Data and privacy aspects

The information on this area is very much scattered. The links included here only a one possible track through the information available in internet. Better covering views are provided by the related books… Picture above is from big data infographic. … Continue reading

Posted in ICT Books, ICT Training and Courses, Privacy, Security Training, Awareness and Reports | Comments Off on Big Data and privacy aspects

SCENECT with Kinect, Tools for capturing house layouts in 3D

SCENECT is a free tool from FARO to capture 3D point cloud of objects and environments. There are several other tools for the similar 3D capture, and the choice depends on the goals. In this case the main goal is … Continue reading

Posted in Anvanced Tools, Audio and Video, For Fun or Interest, Gadgets, Hobbies and Other Interests, Innovation and new tech, Recommended Free Tools, Robotics, Security, Tests | Comments Off on SCENECT with Kinect, Tools for capturing house layouts in 3D

2012 Global Information Security Survey, by Ernst & Young

Ernst & Young has published their latest survey “2012 Global Information Security Survey“. This is a good information source. At the report page, there is an interactive tool to see some of the results. Below 2 such examples are shown … Continue reading

Posted in ICT Leadership and Management, Security Management, Security Training, Awareness and Reports | Comments Off on 2012 Global Information Security Survey, by Ernst & Young