Is my Android secure?

Travelling all over the world I learned that the security related to WIFI-connectivity is in most public places very bad. And yet many people make use of it  despite the alerts they get about a unsecure connection. In fact they do transactions through unsecure WIFI networks like banking transactions. I was amazed. Surely they these … Continue reading Is my Android secure?


Bouwen van een Cyber Defense Center

Bouwen van een CDC. Denk goed na. De markt van security is weliswaar lucratief en de opportunities liggen voor het grijpen maar tegelijkertijd ligt falen of faillissement op de loer. Het ligt voor de hand in markt waarin de vraag naar security groot is, om dan een CDC te bouwen. Waar liggen de gevaren? Maar … Continue reading Bouwen van een Cyber Defense Center

Authentication protocols

Qauth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords. This mechanism is used by companies such as Amazon, Google, Facebook, Microsoft and Twitter to permit the users to share information about their accounts … Continue reading Authentication protocols

Interesting security websites

Here is a short overview of all kind of interesting web sites concerning security. Cobit - Control Objectives for Information and Related Technology. It Govermance Framenwork - International Assurance Control ISACA. To research, develop, promote an authorative up-to-date and generally accepted Objective Information and related technology controls   ESF - European Security Forum - The … Continue reading Interesting security websites

Overview best security tools

  Companies that demonstrate excellence, innovation and leadership in information security. WINNER    FINALISTS Advanced Persistent Threat Protection (APT) Advanced Persistent Threat Protection (APT) WINNER:   FINALISTS: Lastline Enterprise (Lastline, Inc.) Adaptive Defense 360 (Panda Security) Failsafe (Damballa) Anti Malware Anti Malware WINNER:   FINALISTS: Comodo Advanced Endpoint Protection (Comodo) Isla Web Malware Isolation System … Continue reading Overview best security tools

Advanced Endpoint Protection Traps

Advanced Endpoint Protection Traps is a better solution than traditional antivirus. AEP traps has a multi-method prevention approach that secures endpoints against known and unknown malware and exploits before they can compromise a system. Traps prevents security breaches and successful ransomware attacks, in contrast to detection and response after critical assets have been compromised. In … Continue reading Advanced Endpoint Protection Traps

High security controls moving from military to the business

EICAR EICAR is a 68-byte .com file detected as "EICAR-Test-File". This IS NOT a virus but is a manipulated file for testing for the presence of Antivirus systems in email, the file system, or other places. This test file simply displays a text message and returns the control to the operating system. Software vendors agreed about developing a uniform … Continue reading High security controls moving from military to the business

Control your devices in your network!

Long ago, 20 years, you had a terminal emulator such as 5250-emulator to connect to your system. Now-a-days you have so many devices that can be connected ranging from laptops, tablets, cellphones to printers and any endpoint that has an IP-address. How do you control so many devices that try to access the network from … Continue reading Control your devices in your network!

NIST Computer Security Publications – NIST Special Publications (SPs)

Herman Rensink Datacenter - / Cloud Architect /CISSP (Associate Member ISC2) The National Institute of Standards and Technology (NIST) is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Its mission is to promote innovation and industrial competitiveness. It is ONE of the many sources on the Internet. NIST's activities … Continue reading NIST Computer Security Publications – NIST Special Publications (SPs)

STIX and TAXII, standards on security information exchange

Security is becoming increasingly important. Cybercrime is sophisticated and it takes more money, resources and most important, it requires a joined effort of our security solutions. Customers, vendors, commercial and non-commercial organisations should work together in order to defeat or minimise the impact of threats. In light of this two major developments in the area … Continue reading STIX and TAXII, standards on security information exchange