BSidesLondon 2012 – The Feedback

More than two months passed since BSidesLondon 2012 attracted a crowd of over 300 participants, volunteers, speaker, press and sponsors; high time to go through the feedback forms many of you dropped of in exchange for one of the Yubikeys we handed out (as long as stock lasted). Thanks to everyone who took the time […]

Data breaches & log management: A lawyers view

I stumbled upon an interesting article on the ReedSmith blog with the title “Log File Management & Retention Programs: Put the Systems in Place to Turn Static Logs into Active Real-Time Intelligence“. The author is summarizing reasons why (if i may add – correctly implemented) log management and retention is one of the things organisations […]

Convenient email security – opportunistic encryption

A conversation i had the other day touched on the topic of transferring data via email and the risks this poses to the information contained. This kind of conversation seems to come up quite regularly and in many cases the assumption is made that mails sent via the internet are transferred in clear text unless both parties venture in […]

Typosquatting and Doppelganger domains

A whitepaper released earlier this week by GodaiGroup’s Garrett Gee & Peter Kim investigates issues around domain name similarities and typos. I do recommend the read as the paper contains noteworthy information but I believe that most InfoSec professionals will find the facts and takeaways rather boring. It has been topic of discussions and presentations at security events […]

Security and threat intelligence reports

Vendor released security intelligence reports are a double-edged sword; on one hand they are (usually) provided at no cost, on the other hand they tend to have a reputation to carry a bias towards the business focus of the vendor releasing the report. Personally i think many of the reports are of considerable quality and […]