One of my core skills is conducting risk analysis, to be more precise, I tell my customer to quit fiddling with esoteric attacks and focus on the real challenges, like good passwords, MFA and credential hygiene. One common question I get is: Who would like to attack us? We have no money reserves like a […]
Read Full Post »
Posted in Security metrics on Jul 31st, 2015
A few years back I did an engagement were there was a theoretical possibility that I could have stolen millions of euros. Before conducting that assignment I had to answer the simple question: What is my price? After careful consideration and a lot of calculations I concluded that during that time my price was around […]
Read Full Post »
Posted in Security metrics, Technology on May 28th, 2015
It has been all over the news recently: It is possible to hack a plane in-flight! I have to say that this is a bold statement in the first place but the sources site a FBI document. I´m a bit reluctant to actually believe it in the first place. Gladly the staff at Wired clarified […]
Read Full Post »
Posted in Security metrics on Jul 29th, 2014
Finding hard facts about breaches and statistics is quite often a cumbersome process. For this reason I have added a new key word Security metrics to tag post where I have identified valuable security metrics. This is a report from UK with some interesting facts. 81% of large organisations had a breach during 2013 and […]
Read Full Post »