Archive for May, 2012

What to expect from DeepINTEL

May 31, 2012

Preliminary schedule soon (CFP is still open) DeepINTEL will be a conference about security intelligence on September 3rd and 4th 2012 in the heart of Europe. We have prepared this project for a long time and we were monitoring the security intelligence landscape for quite a while. During the last year we had many chances […]

Tags: ,
Posted in Conference, Security Intelligence Comments Off on What to expect from DeepINTEL

Securing Walled Gardens

May 31, 2012

Setting up walled gardens around fancy mobile devices (and probably other computers) is very fashionable among vendors. In theory there is a controlled environment where malicious software is virtually unknown. The vendor can implement a strict quality assurance and can tether any aberrant developers to policies. Since a wall is a fundamental security device the […]

Tags: , , ,
Posted in Discussion, Security Comments Off on Securing Walled Gardens

Bring Your Own Spy – BYOD gone wrong

May 25, 2012

It is reasonably safe to assume that anyone doing business has meetings from time to time. Meeting people and talking to them (or listening) is part of many company’s culture. What do you bring for your meeting? A computer? Maybe. Paper and pencils? Old school but why not. Your cell phone? Most probably! Unfortunately this […]

Tags: , , ,
Posted in Discussion, High Entropy, Security Comments Off on Bring Your Own Spy – BYOD gone wrong

Coding Skills and Security Competence

May 23, 2012

Occasionally we get questions regarding the technical level of presentations at DeepSec. Some are worried about talks at DeepSec being too „in-depth“ for their level of knowledge. You are either a coder turned security researcher hacking bits and bytes, or you are someone dealing with hierarchies and the organisational aspects of information security. It seems […]

Tags: , ,
Posted in Discussion, Security Comments Off on Coding Skills and Security Competence

Cloud Security Promises out of thin Air

May 15, 2012

The „Cloud“ is a wonderful link between the BYOD disaster, data loss and broken security promises. Yet users of all kinds are lured into the web interfaces with eye candy. The German IT magazine Golem.de has published an article about the cloud security study of the Fraunhofer Institute for Secure Information Technology SIT. Researchers have […]

Tags: , , , ,
Posted in Discussion, Security Comments Off on Cloud Security Promises out of thin Air

Data Loss Prevention

May 14, 2012

None of us likes to lose data. Usually data loss is tied to defects of storage media. You can counter physical data loss by having sufficient and recent copies of your data. This is where the logical data loss kicks in – unauthorised copies. Espionage thrives on these copies, and since information can be sold […]

Tags: , , ,
Posted in Discussion, Security Comments Off on Data Loss Prevention

BYOD Madness

May 7, 2012

When it comes to computing we all like convenience, just like in other areas of personal or business life. It’s nice to use familiar tools. Provisioning is much easier for your IT department if your users bring their own hardware. So, let’s sprinkle this idyllic setting with some security in terms of malware protection, data […]

Tags: , ,
Posted in Discussion, Security Comments Off on BYOD Madness

Unlearn to Hack?

May 6, 2012

Security is heavily influenced by the inner workings of the (human) mind. We all know about social engineering and tricks used by con men. The game of smoke and mirrors now hits the „uncontrolled spread of hacking tools“. We have already pointed out that the European Union is preparing a proposal for „banning“ „hacking tools“. […]

Tags: , , , ,
Posted in Discussion, High Entropy, Security 1 Comment »

Security in the Light of Emergency Situations

May 5, 2012

Let’s assume you have put proper security measures into place and you have spiced them up with proper policies so that everyone always knows what to do in certain situations. So far, so good. Now let’s combine this solid security framework with something out of the ordinary. Catastrophic storage failures are a very good example. […]

Tags: , ,
Posted in High Entropy, Security Comments Off on Security in the Light of Emergency Situations