Independent. Dynamic. Involved.
nlen
  1. Islamic State caught in a cyber-web of its own

    By Peter Rietveld and Diederik Perk. At first glance, cyber security seems far from a decisive factor among the violent brutalities happening in Syria and Iraq over the past two to three years. In fact, the offensive operations of Islamic State for Iraq and the Levant (ISIL) rely primarily on antedated communication technologies, without much of a central command structure in place....
  2. InfoSec should shield the Business from Big Data

    By Peter Rietveld and Diederik Perk. The longstanding adage says it best: Generals prepare to fight the last war. Business leaders cannot be faulted for having similar pitfalls when it comes to information security. The domain itself fails to chart its course, while it should aim to navigate towards real-time mapping of the threat spectrum, cost-effective business...
  3. Seven Techniques towards a Mobile Pen-Testing Monitor

    By Bram van Pelt and Diederik Perk. The combination of consumerization and BYOD introduces a major dilemma to enterprise security. Security is losing control over the devices that host corporate data, applications and communications, and with it, the fight against cybercrime. With the increasing number of malware attacks targeting smartphones and tablets equally this...
  4. The trends and customer challenges in identity & access management

    By John van Westeneng CISSP CISM. This blog is based on the same named presentation presented by Corné van Rooij (RSA) and John van Westeneng (Traxion) at the RSA Security Summit 2014 in Amsterdam. In our increasingly cloud-based, mobile world, traditional identity and access solutions can no longer keep up. We are experiencing an identity crisis. Organizations need solutions that empower...
  5. A Heart Bleed Post-Mortem

    By Peter Rietveld and Bram van Pelt. Last week was Heart Bleed week. It was what experts call the biggest security breach in the last years. Both the regular and specialized press have spent a lot of time explaining what this is and how it could be fixed. ...
  6. The Crimean Cyber-Troubles Ramp-Up

    By Peter Rietveld and Diederik Perk. Levels of intensity are on the rise in the Crimea crisis with cyber-warfare being one of its main drivers. Dozens of networks in the Ukraine are infected, government systems among them, with malicious software that secretly performs surveillance, sustains privileged access to networks and databases and may even opt to shut systems down altogether....
Confidental Infomation