Control over our data

Anybody who uses the Internet uses, creates and leaves data behind. While in the past site visits were recorded in the depths of server log files rarely to surface again, these and related data are now the currency of the 21st century. Services are exchanged for data, this is the business model shared by Google, Amazon and many others. But people are becoming more aware that the uninhibited acquisition of their personal data may have negative consequences and no longer trust that their data is protected on the Internet.

read more

Smart buildings merit smarter security

Architects and city planners first began promoting the concept of Smart Buildings, or Building Automation Systems (BAS), around ten years ago. Smart buildings were meant to deliver untold benefits from energy efficiencies and greener lifestyles to cost savings and improved living standards for all. Early examples of IP-connected appliances, however, were not built to cope with the demands of an evolving threat landscape.

read more

Relevant security standards for Internet of Things

Virtually every study exploring the benefits of Internet of Things includes some reservations on IT security. According to an analysis by Deutsche Telekom 90% of managers are concerned about security (Cyber Security Report 2015), 70% of respondents surveyed by VDE see IT security risks (2) and a Bitkom survey reported more than 50 percent of study participants (3) were concerned about privacy and security. These concerns are well founded.

read more

Securing digital signage systems

The average company network has many more devices connecting to it than even just a few years ago. In addition to traditional workstations there are now smartphones and tablets alongside a wide variety of Internet-connected equipment from printers, access control systems and security cameras to digital signage, smart TVs, thermostats and even everyday appliances like coffee machines. In situations where digital signage shares the network with such a diverse range of devices and applications use of software-based site-to-site VPNs are often the best way to ensure security, signal continuity and optimize flexibility.

read more

More anonymity with Tor and VPN?

Tor (The Onion Router) is one of the most important tools for anonymity on the Internet. The Tor network, protocol and client, make it extremely complicated to trace user activity. However, Tor users are not completely invisible. Firstly, only the connection to the exit node – the last server before traffic leaves the Tor network – is encrypted. Whoever controls the exit node can see data traffic in plain text. Meanwhile attacks and statistical analysis methods are known which can allow an organization with access to large parts of global Internet traffic to de-anonymize users in some cases. Nevertheless, Tor can protect users against the curiosity of most unauthorized parties if it is configured correctly. And a better solution is currently not available – at least not for the average computer user.

read more

Connected cars: fresh safety hazards on the road ahead

Advances in connected car technology are set to radically alter the future of driving for everyone. Among the promised benefits is the ability for cars to ‘learn’ from each other, provide early warning of mechanical problems and remotely interact with other devices. They may also allow insurers to accurately build up a ‘risk profile’ for every driver, leading to reduced premiums for some. Connected cars may even allow car manufacturers to target customers individually with software updates to suit their individual tastes.

read more

Realizing the potential of exploit toolkits

Anti-virus companies have identified a new trend: Criminals are increasingly using open source software instead of developing or purchasing their own malware. Kaspersky Lab recently revealed several cyber espionage campaigns, which operate according to this model. Such free tools that were originally designed for security testing contain many tools that criminal hackers can also use for their own purposes. Even more conveniently for hackers, these tools are also developed and maintained by the open source community for free.

read more

Vulnerability scan for Industry 4.0 with LARS

Not a day goes by without Industry 4.0 being touted as the future of the manufacturing industry. And it’s true, the digitization of production environments is already gaining traction, in some sectors more than others. And with all these developments, everyone is concerned with the security of the brave new interconnected world. Now standard hardware and software are in control of motors, switches and pumps, the security risks must be kept in mind by automation engineers. This requires a methodological approach, which is best adapted and linked to a central ISMS policy.

read more

Stay up to date

Subscribe for email updates

Connect With Us

Contributing Member

Want to contribute?

Want to contribute? Drop us a line at