Category Archives: Security Training, Awareness and Reports

Security related awareness, training and reports, including learning sources and events etc.

Android 6 and new privacy related settings

Android version 6, Marshmellow, has adopted a new run-time permission system that is available to the users. Permissions are divided into permission groups and users can modify permissions per application. It is possible to see how many applications are allowed … Continue reading

Posted in Android, Privacy, Protection, Recommended Android Applications, Security Management, Security Training, Awareness and Reports, Tips | Comments Off on Android 6 and new privacy related settings

Insider Threat Report, 2015 by Vormetric

Vormetric has published a set of documents as part of the Vormetric 2015 Insider Threat Report. The research has been conducted by Harris Poll and analyzed by Ovum. Some short extracts are shown below. Worth to have a look. The … Continue reading

Posted in Cloud Security, Risk Management, Security Management, Security Threats, Security Training, Awareness and Reports | Comments Off on Insider Threat Report, 2015 by Vormetric

2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM

From IBM X-Force Research page IBM is proud to sponsor the tenth annual Cost of Data Breach Study, the industry’s gold-standard benchmark research independently conducted by Ponemon Institute. This is another interesting source of information when comparing your organization to … Continue reading

Posted in Cybersecurity, ICT Leadership and Management, Security Management, Security Training, Awareness and Reports | Comments Off on 2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM

Cloud Information Governance: Data Security Study, by Ponemon

Safenet has sponsored a survey called “The Challenges of Cloud Information Governance: A Global Data Security Study“. The purpose of the survey is very interesting: The purpose of this research is to focus on how organizations are putting confidential information … Continue reading

Posted in Cloud Computing, Cloud Security, Security Management, Security Training, Awareness and Reports | Comments Off on Cloud Information Governance: Data Security Study, by Ponemon

Survey Report on Endpoint Security, by Ponemon

Yet another survey report from Ponemon, called 2015 State of Endpoint Report: User-Centric Risk. The survey covered about 700 security practitioners. “This annual study is conducted to understand trends and changes in endpoint risk in organizations. An endpoint can include … Continue reading

Posted in ICT Leadership and Management, Risk Management, Security Management, Security Training, Awareness and Reports | Comments Off on Survey Report on Endpoint Security, by Ponemon

“Tiger in the cage” examples, bow-tie analysis as part of risk assessment

Bowtie analysis might be an helpfull tool for risk assessment. I used yEd to create my own bowtie (see the source at the end). Bow tie analysis in the ISO 31010. Bow tie analysis is a simple diagrammatic way of … Continue reading

Posted in Basic Tools, DIY, Security Management, Security Threats, Security Training, Awareness and Reports, Tests, Tips, Tools | Comments Off on “Tiger in the cage” examples, bow-tie analysis as part of risk assessment

2 Reports on Cybercrime

EC3 (European Cybercrime Centre at Europol) has published a good report on the cybercrime, worth to take a look. The other report by McAfee complements with estimations of the costs. Definitions TechTarget: Cybercrime is a term for any illegal activity … Continue reading

Posted in Security, Security Management, Security Training, Awareness and Reports | Comments Off on 2 Reports on Cybercrime