The Arab spring started with a single ordinary Tunisian fruit seller protesting against government atrocities. Yet it turned into the most potent revolution since the Russian revolution. In the best seller “freakonomics” the authors vociferously...
Read moreAll posts for category Security
Copyright and the Cloud
As promised in my last blog post, the focus this time is very much around the challenges of Intellectual Property, (esp. copyright), in a cloud context. Content protection is one thing, but establishing exactly what one can and can’t do with...
Read moreContent Security and the Cloud
Following on from my previous post about storage in the cloud, the topic of content security, (aka how do you secure what is already stored in the cloud?), seemed like a natural next stop, hence this post no. 3 in the cloud series. What does it take...
Read moreDoes the news define your cyber security policy?
Recent incidents around cyber security have taught us a few things: Stuxnet and its recent offspring called Duqu show how advanced modern cyber threats have become. Apparently, cyber threats can reach out to places were bombs can’t go and do...
Read morePCI DSS Logging as a service
As you may be aware of there is a security standard named PCI DSS that aims to protect credit cards from being subject to fraud. It is a mandatory standard for every company that accepts credit card payments, issues credit cards or handle credit card...
Read moreDomain and DMZ – critical consideration
A DMZ separates an external network from directly referencing an internal network. It does this by isolating the machine that is being directly accessed from all other machines. Most of the time the external network is the Internet and what is in the...
Read moreInformation Security, a long way to maturity
As an information security professional, I do my best in making things as secure yet user-friendly as possible. I would say the ultimate goal of security professionals should be to make use of IT intrinsically secure: users should be protected...
Read moreWhy working security mechanisms still fail
Ever wondered why the security could be breached even if you have a ton of security mechanisms? Most of the time the problem is not technical but a result of poor risk analysis. One reason why the risk analysis is poor is that it doesn´t take the...
Read moreResponsibility and responsible disclosure
Earlier this month a story went round that the GCHQ (responsible for Britain’s SIGINT activities) wants to monitor Britain’s most vital private networks for unusual network traffic. Prime Minister David Cameron invited a number of large companies...
Read moreThe G-factor
Last week, Google introduced two-factor authentication to the masses. In short, this means that you can have your Gmail account protected by something you know (a password) and something you posses (e.g. a phone). With the continuous threat of...
Read more



By
By 














