Category Archives: ICT

ie. ICT Industry related, Telecom & IT

Recommended Book: Cybersecurity for executives

A new book from 2014 “Cybersecurity for Executives: A Practical Guide” is a great book, and definitely worth for reading for persons working on the security management, or as the title says, for executives. Title: Cybersecurity for executives Author : … Continue reading

Posted in ICT Books, ICT Leadership and Management, Security Management | Comments Off on Recommended Book: Cybersecurity for executives

Guidelines for “Assessing Cyber Security Export Risks”, by TechUK

TechUK has published document “Assessing Cyber Security Export Risks“, which is great effort addressing the business ethics aspects. Institute for Human Rights and Business (IHRB) has been involved as well. The coverage is good, content is straight to the point, … Continue reading

Posted in Business Ethics, ICT Leadership and Management, ICT Regulation, Privacy | Comments Off on Guidelines for “Assessing Cyber Security Export Risks”, by TechUK

STIX, Structured Threat Information eXpression, by Mitre

Structured Threat Information eXpression STIX is a collaborative community-driven effort to define and develop a standardized language to represent structured cyber threat information. STIX Use Cases STIX sample This is from the training material. From samples page: STIX Tree Viewer … Continue reading

Posted in ICT, ICT Standards, Security Incidents and Cases, Security Standardization and Practises, Security Threats | Comments Off on STIX, Structured Threat Information eXpression, by Mitre

Indicators of Compromise, OpenIOC and CyBOX

Indicator of compromise IOC IOC in computer forensics is an artifact observed on a network or in operating system that with high confidence indicates a computer intrusion. Typical IOCs are virus signatures and IP addresses, MD5 hashes of malware files … Continue reading

Posted in ICT, ICT Standards, Security Incidents and Cases, Security Standardization and Practises, Security Threats | Comments Off on Indicators of Compromise, OpenIOC and CyBOX

Data Breach reports, by ITRC

Identity Theft Resource Center (ITRC) has been tracking security breaches since 2005, looking for patterns, new trends and any information that may better help us to educate consumers and businesses on the need for understanding the value of protecting personal … Continue reading

Posted in ICT, Security Incidents and Cases, Security Threats, Security Training, Awareness and Reports | Comments Off on Data Breach reports, by ITRC

Cyber essentials

Cyber Essentials scheme is one of the actions under the UK Government policy “Keeping the UK safe in cyber space“. The Cyber Essentials scheme has been developed by Government and industry to fulfil two functions. It provides a clear statement … Continue reading

Posted in Cybersecurity, ICT Regulation, Risk Management, Security Certifications, Security Standardization and Practises | Comments Off on Cyber essentials

Data Protection Laws of the World, by DLA Piper

DLA Piper has published a valuable information source on data protection laws. The handbook is available online (see figure below), or directly as downloadable pdf (almost 400 pages). Other links blog article “Privacy and Data Protection by Country”

Posted in ICT, ICT Books, ICT Regulation, Privacy | Comments Off on Data Protection Laws of the World, by DLA Piper