Independent. Dynamic. Involved.
nlen
  1. Responsible for your perfect Monday: ROCA and KRACK

    ROCA
    By Traxion Threat Management Team, Jan Koot and Thom Otten Monday October 16th 2017 was an eventful day for crypto and security in general. The world was informed about two huge problems in technology we use daily. It was bad enough that it caused quite some commotion and uproar in the tech world. WPA2 was declared insecure due to the KRACK...
  2. Security Warning: Users pressing the snooze button on security warnings

    security-user-shield
    By Diederik Perk. It’s a puzzle that’s never fully finished: how to close the gap between the security policy and its acceptance by a targeted group of users. Setting the policy rules is one thing, to have members of the organization comply is a different ballgame. A recent NIST study uncovered that the majority of users experience security fatigue. This confirms previous...
  3. Blockchain, the next authentication provider?

    By Robin Gaal.  We all heard about the bitcoin, a cryptocurrency which enables people to anonymously perform secure payments. In the heart of the bitcoin is the blockchain; a decentralized database which records all transactions since the beginning of the bitcoin. The integrity of it is continuously being verified by the entire network as opposed to a central...
  4. Islamic State caught in a cyber-web of its own

    By Peter Rietveld and Diederik Perk. At first glance, cyber security seems far from a decisive factor among the violent brutalities happening in Syria and Iraq over the past two to three years. In fact, the offensive operations of Islamic State for Iraq and the Levant (ISIL) rely primarily on antedated communication technologies, without much of a central command structure in place....