The Value of Secure Coding Procedures
I recently had a very interesting conversation with Dave Hyman of Checkmarx, who asked me how I saw the future of cyber security (or information security, take your pick). Now, as I’m sure you´ll agree...
View ArticleOn Dutch Banking Woes and DDoS Attacks
If you don’t live in the Netherlands or don’t happen to have a Dutch bank account, you can certainly be forgiven for not having caught wind of the major banking woes that have been plaguing the Dutch....
View ArticleArgent Consulting buys B-Able Argent Consulting
PRESS STATEMENT Monday, 26th May 2014. The Netherlands: Due to insurmountable differences among management, the joint effort between Argent Consulting and B-Able, dubbed “B-Able Argent Consulting” has...
View ArticleInformation Security, Post-Snowden
As published on Tripwire’s State of Security: The revelations regarding the extensive digital intelligence gathering programs of the American National Security Agency by Edward Snowden won’t have...
View ArticleGCCS2015 Part II: Government Influence is the Key Issue
(As published on Norse: Feb 5th, 2015) As we noted in Part I: GCCS2015: Battlefield for the Internets’ Multi-stakeholder Coup, the next iteration of the Global Conference on CyberSpace (GCCS2015) will...
View ArticleData Mining Protection: Taking A Privacy Roadtrip with IRMA
If you have ever clicked “I Agree” on Facebook or an Apple device without really going through it, it might be worth your while to go back and read up. Do you know where your data is going? A few...
View ArticleThe Problem with the Universal Right to Online Privacy
(As published on Norse on April 15, 2015) A landmark decision by the UN Human Rights Council was made on March 26th to cover privacy issues arising from the pervasive monitoring by the UK and the US,...
View ArticleThe Right to Strike Back
As published on Norse on June 26, 2015. Last week, at the HiP Conference in Paris, there was a debate on whether or not it should be allowed to strike back when you are being hacked. Currently,...
View ArticleMissing in Action: Cyber Dictionary?
As published on Norse on September 22nd, 2015. I recently stumbled over an old issue that has shown no signs of being resolved: the lack of a normalized lexicon on Cyber Security. We can’t seem to...
View ArticleCyber Cease-Fire: US v. China
As published on Norse on October 6th, 2015 Interesting times indeed, now that the outcome of Chinese president Xi Jinping’s two-day visit to the White House last week has been made public. According...
View Article