Independent. Dynamic. Involved.
nlen
  1. All systems – down

    By Peter Rietveld, senior security consultant at Traxion. If you think Heartbleed or Diginotar was a real crisis in crypto – you haven’t seen nothing yet. The next major crisis is on the horizon. And it is, well, kind of complicated. As usual. TLS, the encryption protocol formerly known as SSL, has become the world’s most used cyber security mechanism. As a reaction on growing...
  2. Put Cyber on the Corporate Balance Sheet

    By Peter Rietveld. “Uber, the world’s largest taxi company, owns no vehicles. Facebook, the world’s most popular media owner, creates no content. Alibaba, the most valuable retailer, has no inventory. And Airbnb, the world’s largest accommodation provider, owns no real estate” These words from Tom Goodwin[1] went viral, as a powerful image of the disruptive...
  3. Takeaways from Black Hat Sessions XIII: are InfoSec conferences becoming interchangeable?

    black hats
    By Diederik Perk.    On its first glance, 2015 will go down as a big year for cyber security in the Netherlands. The smoke has barely settled on The Hague after the combined GCSC, ONE, HSD’s CyberSecurity Week and an impromptu rendition of B-sides- courtesy of DCWC- were all taking place in April. Its net-result for this country was a mandate to start an office to promote internet security....
  4. InfoSec should shield the Business from Big Data

    By Peter Rietveld and Diederik Perk. The longstanding adage says it best: Generals prepare to fight the last war. Business leaders cannot be faulted for having similar pitfalls when it comes to information security. The domain itself fails to chart its course, while it should aim to navigate towards real-time mapping of the threat spectrum, cost-effective business...
  5. The trends and customer challenges in identity & access management

    By John van Westeneng CISSP CISM. This blog is based on the same named presentation presented by Corné van Rooij (RSA) and John van Westeneng (Traxion) at the RSA Security Summit 2014 in Amsterdam. In our increasingly cloud-based, mobile world, traditional identity and access solutions can no longer keep up. We are experiencing an identity crisis. Organizations need solutions that empower...
  6. The Crimean Cyber-Troubles Ramp-Up

    By Peter Rietveld and Diederik Perk. Levels of intensity are on the rise in the Crimea crisis with cyber-warfare being one of its main drivers. Dozens of networks in the Ukraine are infected, government systems among them, with malicious software that secretly performs surveillance, sustains privileged access to networks and databases and may even opt to shut systems down altogether....