Quantcast
Channel: Argent Consulting - Full Spectrum Cyber » Argent Consulting - Full Spectrum Cyber | » Security
Browsing all 13 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Social Media as a Cyber Warfare Gamechanger

September of 2012 will live on in infamy for a large number of people. It was the month of the massive riots by Islamic extremists who, incited by the ever present radical imams, stormed several US...

View Article


Image may be NSFW.
Clik here to view.

The Dutch, the Yanks, the Cloud and YOU

Recently a research project by the Amsterdam University [PDF Alert] revealed that US law allows for the US government to access information stored in the Cloud, by (ab)using the PATRIOT act. Multiple...

View Article


Image may be NSFW.
Clik here to view.

The Value of Secure Coding Procedures

I recently had a very interesting conversation with Dave Hyman of Checkmarx, who asked me how I saw the future of cyber security (or information security, take your pick). Now, as I’m sure you´ll agree...

View Article

Image may be NSFW.
Clik here to view.

Trojans for the Bundestag – German PD acquired Finfisher

In December of last year, the German public prosecutors’ office had declared that there was no legal basis for the use of the so-called “Bundestrojaner” spyware, which was used to spy on German...

View Article

Image may be NSFW.
Clik here to view.

On Dutch Banking Woes and DDoS Attacks

If you don’t live in the Netherlands or don’t happen to have a Dutch bank account, you can certainly be forgiven for not having caught wind of the major banking woes that have been plaguing the Dutch....

View Article


Image may be NSFW.
Clik here to view.

PRISM: Tip of the Cyber Intel Iceberg

When Edward Snowden published information on PRISM – a rather drastic intelligence gathering program in which several (assume All) government agencies such as the FBI and the NSA draw intelligence from...

View Article

Argent Consulting buys B-Able Argent Consulting

PRESS STATEMENT Monday, 26th May 2014. The Netherlands: Due to insurmountable differences among management, the joint effort between Argent Consulting and B-Able, dubbed “B-Able Argent Consulting” has...

View Article

Image may be NSFW.
Clik here to view.

Information Security, Post-Snowden

As published on Tripwire’s State of Security: The revelations regarding the extensive digital intelligence gathering programs of the American National Security Agency by Edward Snowden won’t have...

View Article


Image may be NSFW.
Clik here to view.

GCCS2015 Part II: Government Influence is the Key Issue

(As published on Norse: Feb 5th, 2015) As we noted in Part I: GCCS2015: Battlefield for the Internets’ Multi-stakeholder Coup, the next iteration of the Global Conference on CyberSpace (GCCS2015) will...

View Article


Image may be NSFW.
Clik here to view.

Enterprise Security vs. Nation State Threat Actors

The recently published Snowden/NSA/GCHQ slides regarding the Gemalto hack have caused quite a stir amongst security practitioners, board members and politicians alike. But the uproar is minor when...

View Article

Image may be NSFW.
Clik here to view.

The Right to Strike Back

As published on Norse on June 26, 2015. Last week, at the HiP Conference in Paris, there was a debate on whether or not it should be allowed to strike back when you are being hacked. Currently,...

View Article

Image may be NSFW.
Clik here to view.

Missing in Action: Cyber Dictionary?

As published on Norse on September 22nd, 2015. I recently stumbled over an old issue that has shown no signs of being resolved: the lack of a normalized lexicon on Cyber Security. We can’t seem to...

View Article

Image may be NSFW.
Clik here to view.

Cyber Cease-Fire: US v. China

As published on Norse on October 6th, 2015 Interesting times indeed, now that the outcome of Chinese president Xi Jinping’s two-day visit to the White House last week has been made public. According...

View Article

Browsing all 13 articles
Browse latest View live