Category Archives: ICT
Common Criteria, main links
Wikipedia: Common Criteria is a framework in which computer system users can specify their security functional and assurance requirements, vendors can then implement and/or make claims about the security attributes of their products, and testing laboratories can evaluate the products … Continue reading
BSIMM3, Security Maturity and Software Development
BSIMM3 is model tool to compare your maturity against the industry average (earth), see figure below. BSIMM = The Building Security In Maturity Model 42 companies has particpated on this BSIMM project. Some of the company names are public: Adobe, … Continue reading
Asmonia Project, addressing security in Mobile Networks
ASMONIA Project is an interesting approach to address security in Mobile Networks. For persons working on the field, it is worth to look on this material. ASMONIA = Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative … Continue reading
Continuous Security Monitoring, new draft by NIST
NIST has produced an interesting set of drafts related to Continuous Monitoring(CM). Continuous Monitiring here can be explained by sentence: “Continuous security monitoring is a risk management approach to Cybersecurity that maintains a picture of an organization’s security posture, provides … Continue reading
Submarine Cable Map
TeleGeography is publishing Submarine Cable Map. Map shows roughly the cable systems on the globe. It is good information for overall knowledge.
Global Telecom Traffic Map
TeleGeography is publishing Global Traffic Map. Map shows how the traffic is spread around the globe. It is good information for overall knowledge.
ISO 27001 Training videos
There exist nice video set about ISO 27001, presented by Martin Dion. Worth to watch! The tree videos available are: ISO 27001 JanuaryTraining: Introduction to standards (ISO, NIST, PCI etc) ISO 27001 FebruaryTraining Information Security Roles and Responsibilities ISO 27001 … Continue reading