Security resolutions 2014

| | Other
On this last day of the year, it’s time to share some personal resolutions for 2014, related to information security. Auditing tools and advice With my new company CISOfy I will assist more companies in proper hardening their Unix/Linux systems … Continue reading → This post Security resolutions 2014 was ... Read More

A developer’s story about passion for Open Source and Security

This story is definitely a first for me. Not just because every story is unique in itself, but that it’s one of personal matter. The thing is, I quit my well-paid job, just to spend time on the things I’m … Continue reading → This post A developer’s story about ... Read More

Friend or Foe: The CIO – Improve your relationship with the CIO

| | CIO, Friend or Foe
Most big companies have both a CIO and a CISO (or CSO). Depending on how the company is organized, it’s the CISO reporting to the CIO. This relation is special, can be very rewarding, but also has some serious risks. … Continue reading → This post Friend or Foe: The ... Read More

Privacy Protect: Geofencing, a privacy issue or blessing?

With location based services winning quickly in popularity, we have to consider the possible privacy issues it might cause. Since a few years geofencing is being used more often to actually protect data, therefore maybe even increase privacy. Geofencing is … Continue reading → This post Privacy Protect: Geofencing, a ... Read More

DevOps: the solution for application security issues?

When thinking about the weakest link in security, humans might be leading the board. Passwords and software are following closely. Combine these factors and insecurity is born. With the fairly new DevOps movement there is change to be expected. Is … Continue reading → This post DevOps: the solution for ... Read More

CISO toolbox: The tools every CISO should know

Like in every profession, good tools are already half the work. The other half however, is getting the right tool, at the right moment and using it, correct, in the right way. Especially new CISOs might want to invest time … Continue reading → This post CISO toolbox: The tools ... Read More

10 Golden Rules of the Outstanding CISO

| | CISO, Skills, soft skills
1. Maintain your integrity Whatever you do, be upright, incorruptible and honest. Don’t take shortcuts and give people a reason to put their trust in you. 2. Go back to the basics Don’t overcomplicate things, leave the technical or business … Continue reading → This post 10 Golden Rules of ... Read More

Responsible Disclosure: Your Security Stance for Ethical Hackers

Vulnerabilities and misconfigured systems are common examples why a company would obtain a spot in the news headlines. While some big companies are showing off their bounty programs, others provide their security insights by means of a responsible security disclosure. … Continue reading → This post Responsible Disclosure: Your Security ... Read More

Dark Data: the risk of missing out

If you ever used a computer, you are most likely guilty of creating dark data. This fairly new term is also known as “dusty data”, precious data collecting dust on our machines and archives. With technology evolving fast, the speed … Continue reading → This post Dark Data: the risk ... Read More

What is: Security Management

In this new series “What is” we explain specific subjects within the information security domain. Since the audience of this blog is focused on high levels of understanding, we start with “What is security management?”. Security management Within information security … Continue reading → This post What is: Security Management ... Read More
Loading...