Browsing All Posts filed under »Opinion«

How many things are in the Internet of Things? 6.593 billion in 2015 – says Bosch

March 10, 2014 by

0

The term varies a bit depending where you ask: “Web of Connected Objects” (France) ,”Industrie 4.0″ (Germany) and who you ask: “Industrial Internet” (General Electric), “Internet of Things and Services” (Bosch), “Internet of Everything” (Cisco) – but basically means the same: the transformation of life, business and production by not only connecting (traditional) computers and […]

Cyberspace meets the Plant?! So what? No Magic in SCADA Security Management.

May 6, 2013 by

0

Whenever a discussion is on-going about a rather complex and multi-layer subject, it is preferable that the participants agree on terms and definitions, hence meaning the same thing when using professional terms. SCADA is such a term nowadays that is frequently used in public (security) discussions – but unfortunately, not everybody seems to mean the same […]

Many speak of the security issues of the cloud – (too) few of its security opportunities

February 24, 2013 by

0

Since quite a while I am following with interest David T.S. Fraser’s blog on legal aspects of cloud computing. Though called Canadian Cloud Law Blog – News and commentary on legal aspects of cloud computing from a Canadian perspective – his expert commentaries are definitely applicable beyond Canadian soil and jurisdiction. One of his recent posts titled ‘Note […]

Cloud-Sourced Web Security Safeguards

January 4, 2012 by

0

The idea is as simple as it is genius and effective: Let the DNS server decide to grant or not to grant access to a requested URL. After all, almost all requests outbound of the organization’s internal network have to be resolved by an external DNS server and many (if not most) malware bots are […]

A Look at a DDoS Mitigation Service Fine Print

October 22, 2011 by

0

NeuStar UltraDNS is apparently one of the leading global managed DNS providers – handling a quarter of the Internet’s authoritative DNS traffic. One of the additional services they offer is called SiteProtect – a “cloud based DDoS mitigation service” that offers “Defense against DDoS attacks before they reach your infrastructure” , ” Protection for all HTTP and HTTPS traffic, regardless […]

Reality Check: Using Digital Signatures for Business Email

August 21, 2011 by

0

Communication is the lifeblood to do business – and email is still the lifeblood for communication. Out of the box email of even the newest software and systems is not digitally signed. When looking at  the advantages the use of digital email signatures theoretically has (sender authenticity, message integrity, communication transaction non-repudiation) one should think it should […]

The Return Of The Thin (Cloud) Client

June 21, 2011 by

0

Is the arrival of the (Google) Chromebook  the arrival of a business class Thin-Client-for Cloud-Computing? Now, the Thin-Client concept is anything but new, and thin clients are actually an endpoint-security dream for the InfoSec Manager. Application as well as OS vulnerability based attack vectors against thin clients are minimal compared to those of a “fat” […]

Tricky: The Scope of Compliance Certifications

May 14, 2011 by

0

Compliance The need to be compliant to this or that is one of the rare principles that are relatively easy to sell to the board. Confusion, however, usually kicks in as soon as the scope of the compliance has to be decided on.  By that, I do not mean the scope of the compliance criteria […]

Supervisors First

May 10, 2011 by

0

An important lesson learned from dealing with an organization-wide Information Security Awareness program: train the supervisor, or more precisely: train the supervisors first ! Let’s face it: if you are not Google, Amazon or a financial player, chances are high that your senior management has a rather vague idea of information security areas and what […]