nlen
  1. Responsible for your perfect Monday: ROCA and KRACK

    By Traxion Threat Management Team, Jan Koot and Thom Otten Monday October 16th 2017 was an eventful day for crypto and security in general. The world was informed about two huge problems in technology we use daily. It was bad enough that it caused quite some commotion and uproar in the tech world. WPA2 was declared insecure due to the KRACK...
  2. Security Warning: Users pressing the snooze button on security warnings

    By Diederik Perk. It’s a puzzle that’s never fully finished: how to close the gap between the security policy and its acceptance by a targeted group of users. Setting the policy rules is one thing, to have members of the organization comply is a different ballgame. A recent NIST study uncovered that the majority of users experience security fatigue. This confirms previous...
  3. Blockchain, the next authentication provider?

    By Robin Gaal.  We all heard about the bitcoin, a cryptocurrency which enables people to anonymously perform secure payments. In the heart of the bitcoin is the blockchain; a decentralized database which records all transactions since the beginning of the bitcoin. The integrity of it is continuously being verified by the entire network as opposed to a central...
  4. Put Cyber on the Corporate Balance Sheet

    By Peter Rietveld. “Uber, the world’s largest taxi company, owns no vehicles. Facebook, the world’s most popular media owner, creates no content. Alibaba, the most valuable retailer, has no inventory. And Airbnb, the world’s largest accommodation provider, owns no real estate” These words from Tom Goodwin[1] went viral, as a powerful image of the disruptive...
  5. Takeaways from Black Hat Sessions XIII: are InfoSec conferences becoming interchangeable?

    By Diederik Perk.    On its first glance, 2015 will go down as a big year for cyber security in the Netherlands. The smoke has barely settled on The Hague after the combined GCSC, ONE, HSD’s CyberSecurity Week and an impromptu rendition of B-sides- courtesy of DCWC- were all taking place in April. Its net-result for this country was a mandate to start an office to promote internet security....
  6. Necessary Maintenance on your IDM Strategy

    By John van Westeneng, CISSP, CISM. Updating your IDM strategy was never more important that in the current situation. We all understand that IDM is the cornerstone of our organizations business, IT and security processes. IDM has developed from an efficiency and control solution to a business enabler. We seem to understand what IDM can provide to our businesses. Or at least what it could...
  7. Meeting your Compliance mark: 5 ways towards more successful Attestation

    by Diederik Perk.  As the calendar year nears closing, many businesses work on meeting standards of security compliance. Primarily, it entails auditing to get a- more or less- clean bill of health on your user management. Attestation is a method to ensure administrative hygiene by requiring oversight on existing access levels...
  8. Islamic State caught in a cyber-web of its own

    By Peter Rietveld and Diederik Perk. At first glance, cyber security seems far from a decisive factor among the violent brutalities happening in Syria and Iraq over the past two to three years. In fact, the offensive operations of Islamic State for Iraq and the Levant (ISIL) rely primarily on antedated communication technologies, without much of a central command structure in place....
  9. InfoSec should shield the Business from Big Data

    By Peter Rietveld and Diederik Perk. The longstanding adage says it best: Generals prepare to fight the last war. Business leaders cannot be faulted for having similar pitfalls when it comes to information security. The domain itself fails to chart its course, while it should aim to navigate towards real-time mapping of the threat spectrum, cost-effective business...
  10. Seven Techniques towards a Mobile Pen-Testing Monitor

    By Bram van Pelt and Diederik Perk. The combination of consumerization and BYOD introduces a major dilemma to enterprise security. Security is losing control over the devices that host corporate data, applications and communications, and with it, the fight against cybercrime. With the increasing number of malware attacks targeting smartphones and tablets equally this...