Tag Archive

DeepINTEL 2018 Talk: Risk Management in Complex Scenarios – Oscar Serrano

Published on November 8, 2018 By sanna

ICT risk management is a well-stabilized practice and as such is supported by international security standards and guidelines. But, despite advances in the legal and policy areas and the maturation of standardized frameworks for efficient risk management, it has still not become a controlled, systematic process in the cyber security domain of most organizations. One […]

DeepSec 2018 Talk: Left of Boom – Brian Contos

Published on September 13, 2018 By sanna

By Brian Contos, CISO of Verodin: “The idea for my presentation “Left of Boom” was based on conversations I was having with some of my co-workers at Verodin. Many people on our team are former military and some served in Iraq and Afghanistan where they engaged in anti-IED (Improvised Explosive Device) missions. During these conversations […]

Decline of the Scientific Method: New (Austrian) “Trojan” Law without Technical Expertise

Published on August 3, 2017 By sanna

The Crypto Wars are still raging despite everyone relying on secure communication. Everyone means everyone. The good thing is that mathematics still works, even though some people wouldn’t want it to. The latest cryptographic review comes from Amber Rudd, the current UK Home Secretary. She said recently: “Real people often prefer ease of use and […]

Endangered Species: Full Disclosure in Information Security

Published on November 6, 2015 By sanna

History, fictive or real, is full of situations where doubts meet claims. Nearly every invention, every product will be eyed critically, analysed, and tested. There are even whole magazines fully dedicated to this sport, be it for example, consumer protection, reviews of computer games or the car of the year. When it comes to testing […]

DeepSec 2015 Keynote: Can Societies manage the SIGINT Monster?

Published on October 27, 2015 By René Pfeiffer

Gathering data has become very important in the past years. Everyone is talking about intelligence of all shades, few know what it actually means and how you do it properly (we got a workshop for that, if you are interested). Information security needs to anticipate threats and adapt the defences accordingly. The same is true […]

Digital Naval Warfare – European Safe Harbor Decree has been invalidated

Published on October 8, 2015 By René Pfeiffer

The global cargo traffic on the Internet needs to revise its routes. The Court of Justice of the European Union has declared the so-called „Safe Harbor“ agreement between the European Commission (EC) and US-American companies as invalid. The agreement was a workaround to export the EU Directive 95/46/EC on the protection of personal data to […]

DeepINTEL 2015 – How to deal with (Industrial) Espionage

Published on May 15, 2015 By René Pfeiffer

The DeepINTEL event in September will have a strong focus on a specific kind of intelligence. We will address the issue of espionage. Given the headlines of the past six months it is clear that companies are subject to spying. There is no need for euphemisms any more. Even with half of the information published […]

DeepSec 2014 Talk: Build Yourself a Risk Assessment Tool

Published on October 29, 2014 By sanna

„The only advice I might give to everyone who is responsible for information security is that it is never about a tool or a methodology“, says Vlado Luknar. The never-ending quest for the “best” tool or methodology is a futile exercise. In the end it is you, the security specialist, who adds the most value […]

DeepSec 2014 Talk: Build Yourself a Risk Assessment Tool

Published on September 10, 2014 By René Pfeiffer

All good defences start with some good ideas. The is also true for information security. DeepSec 2014 features a presentation by Vlado Luknar who will give you decent hints and a guideline on how to approach the dreaded risk assessment with readily available tools. We have kindly asked Vlado to give you a detailed teaser […]

DeepSec 2013 Video: Future Banking And Financial Attacks

Published on February 24, 2014 By René Pfeiffer

Predicting the future is very hard when it comes to information technology. However in terms of security analysis it is vital to keep your head up and try to anticipate what attackers might try next. You have to be as creative as your adversaries when designing a good defence. This is why we invited Konstantinos […]

DeepSec 2013 Video: Risk Assessment For External Vendors

Published on February 19, 2014 By René Pfeiffer

CIOs don’t like words like „third party“ and „external vendor“. Essentially this means „we have to exchange data and possibly code with organisation that handle security differently“. Since all attackers go for the seams between objects, this is where you have to be very careful. The fun really starts once you have to deal with […]

DeepSec 2013 Talk: Future Banking And Financial Attacks

Published on November 7, 2013 By René Pfeiffer

Hey, you! Want to know a secret? Your adversaries are after money. Taken the „cyber shoot-outs“ of governments aside, no sophisticated attack happens without economical benefits. Attackers don’t care where the money comes from. However they care for efficiency. They do not compromise web server after web server to hope for some loot which can […]

DeepSec 2013 Talk: Risk Assessment For External Vendors

Published on November 6, 2013 By René Pfeiffer

No man is an island. If this is true for every single one of us, then it is also true for companies. Modern enterprises have business to business (B2B) relations. They are at the centre of a network of suppliers and other vendors. Information flows between the players since they need to exchange data. What […]

DeepSec 2013 Workshop: Developing and Using Cybersecurity Threat Intelligence

Published on September 26, 2013 By René Pfeiffer

The arsenal of components you can use for securing your organisation’s digital assets is vast. The market offers a sheer endless supply of application level gateways (formerly know as „firewalls“), network intrusion detection/prevention systems, anti-virus filters for any kind of platform (almost down to the refrigerator in the office), security tokens, biometrics, strong cryptography (just […]

Zombies at the Hospital

Published on October 31, 2012 By René Pfeiffer

It’s 31 October, so we have to talk about these zombies. You know them from the horror films. Dead, evil, and always hungry for brains (the latter also being true for any self-respecting HR department). Security researchers know a different kind of zombie. A zombie computer is a machine or device infected by a computer […]