Blog vulnerabilities
![](https://ictinstitute.nl/wp-content/uploads/2019/05/photo-1521089876157-d82e46fba7fe.jpg)
Information Security – Incident management & template incident register
Information Security is a continuous effort; staff handling information needs to be trained regularly, systems need updating to remain secure, assets and risks change, and incidents need addressing. A complete risk register gives you a good idea of what might happen, but without a plan for both anticipated and unanticipated incidents there is a good…
Joost Krapels![](https://ictinstitute.nl/wp-content/uploads/2017/12/OWASP-top-ten-2017.png)
The new OWASP top 10 of security vulnerabilities
The Open Web Application Security Project is a very successful free initiative to make Internet Applications more secure. The best known OWASP project is the OWASP top 10, a list of the most common application security vulnerabilities. This top 10 is updated every four years, and the latest 2017 op 10 was published on November 20th.
Sieuwert van Otterloo![](https://ictinstitute.nl/wp-content/uploads/2016/02/CVE-vulnerabilities-per-year.png)
Fewer security vulnerabilities found in 2015
Finally some good news on IT security: The total number of IT security vulnerabilities was 20% lower than in 2014, according to ICT Institute analysis based on CVE data. Apple was the most vulnerable vendor and the iPhone OS and Mac OS X were the most vulnerable products.
Sieuwert van Otterloo