Category Archives: Security Organizations
Global heatmap, by G4S Risk Consulting
Global Intelligence System (GIS) is providing an online service, including a Heatmap and Global forecast reports. There are forecast reports freely available, and they can provide short and concise information about current threats and hazards globally. Please see the links … Continue reading
Electronic Communication Annual Incident Reports, by ENISA
ENISA publishes annual reports about significant incidents in the electronic communications sector. ENISA is receiving these reports from National Authorities (see figure below). The latest report from 2012 incidents is now available. In total 18 countries reported 79 significant incidents, … Continue reading
Good to Know, Critical Controls for Effective Cyber Defense
Often referred as “SANS Twenty Critical Security Controls for Effective Cyber Defense“, is a collection of controls which are believed to have the greatest impact in improving risk posture against real-world threats. There is no shortcut or “miracle medicin” when … Continue reading
Cloud Computing incident statistics, by CSA
Do incidents happen in the Cloud? And are we talking about? Which kind of incidents? To have some answers and views on these questions, it is worth to look the report by CSA called “Cloud Computing Vulnerability Incidents: A Statistical … Continue reading
ENISA Threat Landscape
ENISA has published (jan 2013) a report called Threat Landscape. It is good reading for seeing the current trends… The ENISA Threat Landscape provides an overview of threats, together with current and emerging trends. It is based on publicly available … Continue reading
Who-is-who on Information Security, Europe by ENISA
ENISA‘s who-is-who Directory on Network and Information Security 2011 is good source of information to search for security organizations within different european countries.
Risks and recommendation for smartphone users, report by ENISA
ENISA has published a report called “Smartphones: Information security risks, opportunities and recommendations for users”, which is good reading for smartphone security issues. 10 different risks are evaluated: R1 Data leakage R2 Improper decommissioning R3 Unintentional data disclosure R4 Phishing … Continue reading