The #privacy internet is finally becoming faster; a lot!
Why is it important to have a BOYD policy
Bring your own device or BOYD has become a trend in organizations and bring as many benefits. However, certain risks along, too!
The case of the spying paper shredder
Cybercrime comes in many forms industrial espionage is one of them. Today, we are not even safe from paper shredders in the offices anymore.
The most complex case of CEO Fraud… yet; and how to mitigate it.
CEO fraud is one of the most devious forms of cybercrime, and social engineering. The most complex form was experienced, and the risk for future attacks was mitigated.
Why it’s a good idea to isolate EOL applications/software with insufficient patches, and how to do it
Software that it’s not regularly updated presents at risk. However, sometimes it is out of our influence whether or not a software remains up to date. If the software vendor does not provide updates and patches in time, and option to deal with such situations is to isolate software in virtual machines etc.
Why you don’t want your RJ 45 sockets available in the wild
This post is about the security risks of having exposed RJ 45 sockets and your organization.
European Parliament: Special Committee on Terrorism > Brief by Lars Hilse on the risks of Cyber Terrorism
In July 2018, I was invited to provide a briefing to the Special Committee on Terrorism of the European Parliament about the risks of cyber terrorism on critical infrastructure and public spaces.