Feed on
Posts
Comments

Category Archive for 'Security Architecture'

I have been asked to do a presentation at a client regarding cloud security mechanisms and have started to give this some thought. There of course is a huge amount of material but I´ll try to keep in simple. The core components of cloud security are: Identity, SIEM, Encryption, Mobility, Federation and Trust. Of course […]

Read Full Post »

A report from ’Trusselsvurderingsenheden ved Center for Cybersikkerhed’ in Denmark shows that the threat level against Denmark’s authorities and private companies are very high. According to Thomas Lund-Sørensen, manager for Center for Cybersikkerhed, this means that hacks are occurring. This comes as no surprise for anyone working in this field but the interesting questions are […]

Read Full Post »

Security in the sky

Soon I´m doing flight 200 this year, it´s me and George. 😉 Still I wonder why so many fellow travellers don´t protect their computer screens. Sitting in my seat 9D I currently see one person writing a letter of resignation, one is creating a proposal, one is reading a report about their company being compromised […]

Read Full Post »

The last weeks I have been testing out SecuriCAD and tried to understand if it provides me with some value in my line of work. It´s seldom that I encounter something new under sun but this time I have found a very interesting product. I was asked to conduct a risk analysis recently and decided […]

Read Full Post »

For the one that only has a hammer all problems looks like nails. I have met many skilled security experts during my years and count quite a few of them as my friends. Sadly, I have also met quite a number of so called senior security experts that struggles to solve security problems with only […]

Read Full Post »

I´m working a lot with security architecture and spend quite some time modelling and testing if a security architecture is safe and sound. The biggest struggle in this process is that it is way to slow for my liking. Sure I could test a security architecture in a few day and write a rather nice […]

Read Full Post »

I´m returning to Ashley Madison again. It has turned out that the information has been released and the damage for the company is massive to say the least. Not only is a truckload of customer information put into the wild with extortion, threats and news exposure flaming up everywhere but even worse (if possible) is […]

Read Full Post »

There are times when I wonder why I even started working with security. Today is such a time. I´m currently working at a proposal for Security as a service. Yes, it´s doable but it sure is a struggle to cover everything that’s needed. Gladly it´s not a fixed price offer but only a framework from […]

Read Full Post »

As you may have notice I spend a lot of my time ‘Up in the air’, still haven´t seen Gorge though. 😉 I always sit in the aisle seats, mostly to be able to leave the plane quickly after landing, but sometimes to watch who is working with what. Even in the year 2015 people […]

Read Full Post »

I was advising a QSA recently that struggled to understand a mainframe tokenisation solution. She could not her head around the technology hence she couldn´t review it. I asked her if she had conceptualised it but that had not occurred to her. To solve the situation I brought forward my architecture views on PCI and […]

Read Full Post »

« Prev - Next »