Category Archives: Security Training, Awareness and Reports
Android 6 and new privacy related settings
Android version 6, Marshmellow, has adopted a new run-time permission system that is available to the users. Permissions are divided into permission groups and users can modify permissions per application. It is possible to see how many applications are allowed … Continue reading
Insider Threat Report, 2015 by Vormetric
Vormetric has published a set of documents as part of the Vormetric 2015 Insider Threat Report. The research has been conducted by Harris Poll and analyzed by Ovum. Some short extracts are shown below. Worth to have a look. The … Continue reading
2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM
From IBM X-Force Research page IBM is proud to sponsor the tenth annual Cost of Data Breach Study, the industry’s gold-standard benchmark research independently conducted by Ponemon Institute. This is another interesting source of information when comparing your organization to … Continue reading
Cloud Information Governance: Data Security Study, by Ponemon
Safenet has sponsored a survey called “The Challenges of Cloud Information Governance: A Global Data Security Study“. The purpose of the survey is very interesting: The purpose of this research is to focus on how organizations are putting confidential information … Continue reading
Survey Report on Endpoint Security, by Ponemon
Yet another survey report from Ponemon, called 2015 State of Endpoint Report: User-Centric Risk. The survey covered about 700 security practitioners. “This annual study is conducted to understand trends and changes in endpoint risk in organizations. An endpoint can include … Continue reading
“Tiger in the cage” examples, bow-tie analysis as part of risk assessment
Bowtie analysis might be an helpfull tool for risk assessment. I used yEd to create my own bowtie (see the source at the end). Bow tie analysis in the ISO 31010. Bow tie analysis is a simple diagrammatic way of … Continue reading
2 Reports on Cybercrime
EC3 (European Cybercrime Centre at Europol) has published a good report on the cybercrime, worth to take a look. The other report by McAfee complements with estimations of the costs. Definitions TechTarget: Cybercrime is a term for any illegal activity … Continue reading