Category Archives: Security Training, Awareness and Reports
Flow diagram of payment card data, or personal data, in the cloud
The recent PCI DSS Information supplement “PCI DSS Cloud Computing Guidelines” emphasizes the same message as earlier guidelines like ISO standard “29100 Privacy Framework“ NIST SP 800-122: Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) NIST SP 800-122: … Continue reading
EclipseCrossword, Tool for creating crossword puzzles for training or for fun
EclipseCrossword is one of the crossword creating tools available. It can be usefull as part of the training, for example during security awareness training. Or for creating a monthly competition… Good: Can import your clues and answers text file (csv) … Continue reading
Quaterly Threats Reports, by McAfee
McAfee is producing quaterly threat reports which are very informative and summarizes the latest “threats”. McAfee Threats Report: Third Quarter 2012 McAfee Threats Report: Second Quarter 2012 I have not found any good page which presents these reports. However, they … Continue reading
Security short film “Companies like yours”, by Deloitte
Deloitte has published a well done short film. Worth to look! Companies like yours “Deloitte supported the creation of a short film to illustrate the complex topic of cyber security and help organisations understand the huge impact a cyber attack … Continue reading
PbD, Privacy by Design concept
http://privacybydesign.ca is the main place for Privacy by Design concept. “Privacy by Design (PbD) represents a significant shift from traditional approaches to protecting privacy, which focus on setting out minimum standards for information management practices and providing remedies for privacy … Continue reading
Ransomware included in Top 5 Security Predictions for 2013, by Symantec
Ransomware Symantec has published report/whitepaper “Ransomware: A Growing Menace“. This malware is highly profitable, with as many as 2.9 percent of compromised users paying out. An investigation into one of the smaller players in this scam identified 68,000 compromised computers … Continue reading
Money Behind the Malware, and security training tools by Sophos
Sophos can published a good information for learning more about malwares today. For example, the document on Exposing the Money Behind the Malware: How cybercrime works and what to do about it (direct link to pdf) It introduces concepts like … Continue reading