Skip to content
Lars Hilse – Cyber Incident Response // Cyber Security // Cybercrime // Cyber Terrorism // Cyber Defense

Lars Hilse – Cyber Incident Response // Cyber Security // Cybercrime // Cyber Terrorism // Cyber Defense

Cyber Incident Response // Cyber Security // Cyber Crime // Cyber Terrorism // Cyber Defense

  • Project ACRAC: Advanced Cybersecurity Risk Assessment Checklist
  • What I do

Category: cyber security

Cyber Insurance: What is a DDoS attack and how to mitigate it?

November 7, 2018November 7, 2018 ~ larshilse ~ Leave a comment

DDoS attacks are still a thing. But they are also easy to mitigate. Here is how, and an interesting discussion about the topic.

Why is it important to have a BOYD policy

October 31, 2018October 30, 2018 ~ larshilse ~ Leave a comment

Bring your own device or BOYD has become a trend in organizations and bring as many benefits. However, certain risks along, too!

Why it’s a good idea to isolate EOL applications/software with insufficient patches, and how to do it

October 30, 2018October 30, 2018 ~ larshilse ~ Leave a comment

Software that it’s not regularly updated presents at risk. However, sometimes it is out of our influence whether or not a software remains up to date. If the software vendor does not provide updates and patches in time, and option to deal with such situations is to isolate software in virtual machines etc.

Why you don’t want your RJ 45 sockets available in the wild

October 30, 2018October 30, 2018 ~ larshilse ~ Leave a comment

This post is about the security risks of having exposed RJ 45 sockets and your organization.

Posts navigation

Newer posts

About this Blog

These are my opinions on #CyberSecurity, #Cybercrime, #CyberTerrorism, #CyberDefense, et al.

I publish using dictation tools; find a typo? You’re welcome to keep it.

My publications, appearances, projects, etc. can be here on TOR: http://larshilse3xpyawo.onion/ ; if you can’t use TOR, use this link through the clear web: https://larshilse3xpyawo.tor2web.xyz

Contact

Email: [email protected] PGP: 44D5 68A1 32A1 AD87 3E29 2AA2 9B4A 1674 17FF C660

Phone: +49 (0)4835 9513027

Please use my full name in the “To” line with my email address, as this will make your message look less like spam. This will happen automatically if you have me in your address book. If you just type in my email address, I probably won’t see your mail.

Recent Posts

  • So, What’s This Usability vs. Security Kerfuffle All About Then? A Summary, If You Must.
  • Corporate Eavesdropping: Why This Isn’t Just an “IT Problem”
  • The Malicious Insider: and why you should loose sleep over him
  • Socio-Technical Cybersecurity – The Human Clusterfuck in Cybersecurity and why Your Firewall Won’t Save You When Karen Clicks a Phishing Link
  • China’s Drone Warfare Advances: A Bloody Game-Changer for Global Security

Archives

  • May 2025
  • April 2025
  • December 2022
  • March 2020
  • October 2019
  • June 2019
  • May 2019
  • February 2019
  • November 2018
  • October 2018
  • July 2018

Categories

  • ACRAC (16)
  • Application security (9)
  • ceo fraud (4)
  • corporate risks (2)
  • crytocurrency (1)
  • cyber crime (18)
  • cyber defence (3)
  • cyber security (24)
  • cyber terrorism (2)
  • dark web (3)
  • digital ethics (7)
  • global risks (24)
  • infosec reader questions (6)
  • privacy (11)
  • risk management (37)
  • social engineering (4)
  • Uncategorized (4)
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Proudly powered by WordPress ~ Theme: Penscratch 2 by WordPress.com.