Independent. Dynamic. Involved.
  1. Seven Techniques towards a Mobile Pen-Testing Monitor

    By Bram van Pelt and Diederik Perk. The combination of consumerization and BYOD introduces a major dilemma to enterprise security. Security is losing control over the devices that host corporate data, applications and communications, and with it, the fight against cybercrime. With the increasing number of malware attacks targeting smartphones and tablets equally this...
  2. A Heart Bleed Post-Mortem

    By Peter Rietveld and Bram van Pelt. Last week was Heart Bleed week. It was what experts call the biggest security breach in the last years. Both the regular and specialized press have spent a lot of time explaining what this is and how it could be fixed. ...
Confidental Infomation