Independent. Dynamic. Involved.
nlen
  1. Seven Techniques towards a Mobile Pen-Testing Monitor

    By Bram van Pelt and Diederik Perk. The combination of consumerization and BYOD introduces a major dilemma to enterprise security. Security is losing control over the devices that host corporate data, applications and communications, and with it, the fight against cybercrime. With the increasing number of malware attacks targeting smartphones and tablets equally this...
  2. The trends and customer challenges in identity & access management

    By John van Westeneng CISSP CISM. This blog is based on the same named presentation presented by Corné van Rooij (RSA) and John van Westeneng (Traxion) at the RSA Security Summit 2014 in Amsterdam. In our increasingly cloud-based, mobile world, traditional identity and access solutions can no longer keep up. We are experiencing an identity crisis. Organizations need solutions that empower...
  3. A Heart Bleed Post-Mortem

    By Peter Rietveld and Bram van Pelt. Last week was Heart Bleed week. It was what experts call the biggest security breach in the last years. Both the regular and specialized press have spent a lot of time explaining what this is and how it could be fixed. ...
  4. The Crimean Cyber-Troubles Ramp-Up

    By Peter Rietveld and Diederik Perk. Levels of intensity are on the rise in the Crimea crisis with cyber-warfare being one of its main drivers. Dozens of networks in the Ukraine are infected, government systems among them, with malicious software that secretly performs surveillance, sustains privileged access to networks and databases and may even opt to shut systems down altogether....