Subscribe: Dragan on Security
http://www.conwex.info/blog/?feed=rss2
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
based services  blog  conference  continued  information security  information  management  new  october  process  security  sha   
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Dragan on Security

Blog – Dragan Pleskonjic



Personal Website



Last Build Date: Tue, 09 Jan 2018 12:50:36 +0000

 



Security Predictions Web Site

Fri, 05 Jan 2018 18:55:40 +0000

By beginning of October 2017 I started Security Predictions experimental web site. It has been built to harness the ‘wisdom of crowds’. I experiment how we can use crowd-sourced security intelligence to predict future events. Feel free to contribute with your … Continued



Blog: Dragan on Security

Sat, 14 Jan 2017 17:16:33 +0000

This is “Dragan on Security” blog. It has been moved from http://conwex.info/blog/ to this domain. It is not too active at present time as it was earlier, but stay tuned.



SHA-3 Winner is KECCAK

Wed, 03 Oct 2012 13:04:54 +0000

The National Institute of Standards and Technology (NIST) announced on October 2, 2012 the selection of KECCAK as the winner of the SHA-3 Cryptographic Hash Algorithm Competition and the new SHA-3 hash algorithm. Keccak makes use of the sponge construction … Continued



Possible Approaches to Information Security

Sat, 08 Sep 2012 07:42:30 +0000

There are three possible approaches to information security: reactive, proactive, and predictive. Reactive Information Security – Post incident detection, analysis, notification, containment, eradication, and remediation. Proactive Information Security – Avoiding or opposing threats against computers and networks through understanding the … Continued



Information Security Audit and Assessment

Fri, 07 Sep 2012 17:38:48 +0000

During period April – October 2011, I have gone through trainings, passed the exams and obtained new certificates: Certified ISMS Lead Auditor – ISO / IEC 27001 Information Security Management System PCI ISA (Payment Card Industry Internal Security Assessor), PCI … Continued



Security Risk Management for Critical Infrastructures

Fri, 07 Sep 2012 17:32:44 +0000

Two colleagues and I presented paper titled “Security Risk Management for Critical Infrastructures” at itAIS 2011 Conference, “Information Systems: a crossroads for organization, management, accounting and engineering”, held in Rome, Italy, October 7 – 8, 2011. Abstract: This paper presents … Continued



Location Based Services – Security and Privacy Aspects

Fri, 07 Sep 2012 17:21:30 +0000

On September 28th, I delivered presentation on topic “Location Based Services – Security and Privacy Aspects” on global group Telenor Security Conference 2011. Abstract: Location based services are fast growing area in various types of businesses, particularly concerning mobile operators … Continued



New age of blog “Dragan on Security”

Fri, 07 Sep 2012 08:42:03 +0000

Welcome to new age of my blog “Dragan on Security”. After more than seven years of blogging on previous platform (since August 28, 2005), I decided to move and to switch to new look and structure of blog. I have … Continued



Citation at Fourth Balkan Conference in Informatics

Sun, 23 May 2010 08:06:07 +0000

One statement from our earlier book, which has been published 2007, was cited at IEEE Conference Journal. It is interesting and actual for many organizations at moment: "Security is a process of keeping necessary level of risk in acceptable boundaries. That means security is a continual process and not a final state. Organization or institution can’t consider itself “secured” after last security check. That process needs to be continual." DOI link: http://doi.ieeecomputersociety.org/10.1109/BCI.2009.20.



Citation and Quotes

Thu, 13 May 2010 14:20:12 +0000

I was cited and quoted couple of times in IEEE Computer Magazine article "Fighting Intrusions into Wireless Networks", Springer Link Book “Novel Algorithms and Techniques in Telecommunications and Networking” and Telektronikk Journal.