-
Recent Posts
Archives
- September 2022
- November 2021
- October 2021
- August 2020
- June 2020
- January 2020
- May 2018
- July 2017
- May 2017
- December 2016
- August 2016
- July 2016
- June 2016
- March 2016
- February 2016
- January 2016
- December 2015
- October 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- December 2014
- October 2014
- September 2014
- June 2014
- April 2014
- February 2014
- January 2014
- December 2013
- September 2013
- July 2013
- June 2013
- May 2013
- March 2013
- February 2013
- January 2013
- December 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
Meta
- APT
- Audit
- BCM
- BCM Middle East
- Biological Threats
- Biometrics
- Breach Notifications
- Business Continuity
- Censorship
- Child Online Protection
- CIP
- Cloud Computing
- Compliance
- Crisis Management
- Critical Infrastructure
- Cryptography
- cyber security
- Cyber Security Strategy
- Cyber Warfare
- Cyclone
- Data Breach
- Data Privacy
- Disaster
- Disaster Management
- Disaster Recovery
- Distinguished Personalities
- e-waste
- Energy Sector
- GDPR
- Governance
- Government Legislations
- Industrial Control Systems
- Information Security
- Innovation
- Internet Of Things
- ISO 27001
- Logging and Monitoring
- Malware
- Mobile Threats
- Natural Disaster
- Natural Threats
- Others
- PCI DSS
- PKI
- Political Risks
- Privacy
- Privacy Management
- Resilience
- Risk Management
- SCADA
- Secure Systems
- SIEM
- Smart Cities
- Social Media
- SuperComputing
- Threats
- Tools
Blog Stats
- 13,501 hits
-
Join 11 other subscribers
Links
Monthly Archives: June 2016
Don’t pay the Ransom! AVG releases six free decryption tools to retrieve your files
Originally posted on securityXspace:
Don’t pay the Ransom! AVG releases six free decryption tools to retrieve your files http://ift.tt/294C3U6 Ransomware has proven very lucrative for criminals. Many have extended their “business” models by adding ransomware to their malicious catalog. To…
Posted in Uncategorized
Leave a comment
Explaining risk management in plain English
Explaining risk management in plain English By. Mr. Norman I have been saying for a while that one of the reasons for the disconnect between senior executives and risk practitioners is the latter’s language. Leaders of the organization speak in … Continue reading
Posted in Information Security, Risk Management
Tagged Information Security, Risk Management
Leave a comment