Syndicated Blog

Technicalinfo.net Blog
Technicalinfo.net Blog by Gunter Ollmann focuses exclusively on Internet security. Gunter has built and led multiple professional hacking and security research organizations around the world. He is the founder of Ablative Security Inc. and currently CTO for Security within the Cloud + Enterprise Security division at Microsoft – formerly CSO at Vecta AI, CTO at NCC Group, formerly CTO at IOActive, and former Chief Security Strategist at IBM Internet Security Systems.
Ubiquitous Video Surveillance and the Policing Paradigm Change it Brings

Ubiquitous Video Surveillance and the Policing Paradigm Change it Brings

Policing in the 21st Century is obviously changing rapidly. New technological advances are fundamentally changing the way in which police forces and related government entities can track, locate, and collect evidence.Two game ...
The Diet Pill Security Model

The Diet Pill Security Model

The information security industry, lacking social inhibitions, generally rolls its eyes at anything remotely hinting to be a "silver bullet" for security. Despite that obvious hint, marketing teams remain undeterred at labeling ...
The Missing Piece of the Security Conference Circuit

The Missing Piece of the Security Conference Circuit

| | Conferences, security, training
So far this year I think I've attended 20+ security conferences around the world - speaking at many of them. Along the way I got to chat with hundreds of attendees and ...
The Security Talent Gap is Misunderstood and AI Changes it All

The Security Talent Gap is Misunderstood and AI Changes it All

| | AI, Cloud, future, security
Despite headlines now at least a couple years old, the InfoSec world is still (largely) playing lip-service to the lack of security talent and the growing skills gap.The community is apt to ...
Cyber Scorecarding Services

Cyber Scorecarding Services

Ample evidence exists to underline that shortcomings in a third-parties cyber security posture can have an extremely negative effect on the security integrity of the businesses they connect or partner with. Consequently, ...
NextGen SIEM Isn’t SIEM

NextGen SIEM Isn’t SIEM

Security Information and Event Management (SIEM) is feeling its age. Harkening back to a time in which businesses were prepping for the dreaded Y2K and where the cutting edge of security technology ...
Lock Picking at Security Conferences

Lock Picking at Security Conferences

Both new and returning attendees at technical security conferences are often puzzled by the presence of lock picking break-out areas and the gamut of hands-on tutorials. For an industry primarily focused on ...
Consumer IoT Security v1.01

Consumer IoT Security v1.01

They say charity begins at home, well IoT security probably should too. The growing number of Internet enabled and connected devices we populate our homes with continues to grow year on year ...
Deception Technologies: Deceiving the Attacker or the Buyer?

Deception Technologies: Deceiving the Attacker or the Buyer?

Deception technologies, over the last three-ish years, have come into vogue; with more than a dozen commercial vendors and close to a hundred open source products available to choose from. Solutions range ...
What would you do if...

What would you do if…

| | career, future, technology
As a bit of a "get to know your neighbor" exercise or part of a team building exercise, have you ever been confronted with one of those "What would you do if..." ...