Category Archives: Security Management

Cloud Security Spotlight Report (survey)

Yet another survey results are available in the “2016 Cloud Security Spotlight Report” and is interesting reading. slides webinar Example Applications Q: Which of the following cloud applications are deployed or will be deployed in your organization? Example Authentication Q: … Continue reading

Posted in Cloud Security, ICT Leadership and Management, Security Management | Comments Off on Cloud Security Spotlight Report (survey)

Android 6 and new privacy related settings

Android version 6, Marshmellow, has adopted a new run-time permission system that is available to the users. Permissions are divided into permission groups and users can modify permissions per application. It is possible to see how many applications are allowed … Continue reading

Posted in Android, Privacy, Protection, Recommended Android Applications, Security Management, Security Training, Awareness and Reports, Tips | Comments Off on Android 6 and new privacy related settings

Insider Threat Report, 2015 by Vormetric

Vormetric has published a set of documents as part of the Vormetric 2015 Insider Threat Report. The research has been conducted by Harris Poll and analyzed by Ovum. Some short extracts are shown below. Worth to have a look. The … Continue reading

Posted in Cloud Security, Risk Management, Security Management, Security Threats, Security Training, Awareness and Reports | Comments Off on Insider Threat Report, 2015 by Vormetric

2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM

From IBM X-Force Research page IBM is proud to sponsor the tenth annual Cost of Data Breach Study, the industry’s gold-standard benchmark research independently conducted by Ponemon Institute. This is another interesting source of information when comparing your organization to … Continue reading

Posted in Cybersecurity, ICT Leadership and Management, Security Management, Security Training, Awareness and Reports | Comments Off on 2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM

Cloud Information Governance: Data Security Study, by Ponemon

Safenet has sponsored a survey called “The Challenges of Cloud Information Governance: A Global Data Security Study“. The purpose of the survey is very interesting: The purpose of this research is to focus on how organizations are putting confidential information … Continue reading

Posted in Cloud Computing, Cloud Security, Security Management, Security Training, Awareness and Reports | Comments Off on Cloud Information Governance: Data Security Study, by Ponemon

Survey Report on Endpoint Security, by Ponemon

Yet another survey report from Ponemon, called 2015 State of Endpoint Report: User-Centric Risk. The survey covered about 700 security practitioners. “This annual study is conducted to understand trends and changes in endpoint risk in organizations. An endpoint can include … Continue reading

Posted in ICT Leadership and Management, Risk Management, Security Management, Security Training, Awareness and Reports | Comments Off on Survey Report on Endpoint Security, by Ponemon

Unintentional Insider Risk, report by Ponemon

Raytheon has published an interesting report called “The Unintentional Insider Risk in United States and German Organizations“, conducted by Ponemon Institute. Worth to have a look. Some highlights: IT practitioners agree unintentional employee negligence causes more security incidents than intentional … Continue reading

Posted in ICT Leadership and Management, Security Management, Security Threats | Comments Off on Unintentional Insider Risk, report by Ponemon