Social Media as a Cyber Warfare Gamechanger
September of 2012 will live on in infamy for a large number of people. It was the month of the massive riots by Islamic extremists who, incited by the ever present radical imams, stormed several US...
View ArticleThe Dutch, the Yanks, the Cloud and YOU
Recently a research project by the Amsterdam University [PDF Alert] revealed that US law allows for the US government to access information stored in the Cloud, by (ab)using the PATRIOT act. Multiple...
View ArticleThe Value of Secure Coding Procedures
I recently had a very interesting conversation with Dave Hyman of Checkmarx, who asked me how I saw the future of cyber security (or information security, take your pick). Now, as I’m sure you´ll agree...
View ArticleTrojans for the Bundestag – German PD acquired Finfisher
In December of last year, the German public prosecutors’ office had declared that there was no legal basis for the use of the so-called “Bundestrojaner” spyware, which was used to spy on German...
View ArticleOn Dutch Banking Woes and DDoS Attacks
If you don’t live in the Netherlands or don’t happen to have a Dutch bank account, you can certainly be forgiven for not having caught wind of the major banking woes that have been plaguing the Dutch....
View ArticlePRISM: Tip of the Cyber Intel Iceberg
When Edward Snowden published information on PRISM – a rather drastic intelligence gathering program in which several (assume All) government agencies such as the FBI and the NSA draw intelligence from...
View ArticleArgent Consulting buys B-Able Argent Consulting
PRESS STATEMENT Monday, 26th May 2014. The Netherlands: Due to insurmountable differences among management, the joint effort between Argent Consulting and B-Able, dubbed “B-Able Argent Consulting” has...
View ArticleInformation Security, Post-Snowden
As published on Tripwire’s State of Security: The revelations regarding the extensive digital intelligence gathering programs of the American National Security Agency by Edward Snowden won’t have...
View ArticleGCCS2015 Part II: Government Influence is the Key Issue
(As published on Norse: Feb 5th, 2015) As we noted in Part I: GCCS2015: Battlefield for the Internets’ Multi-stakeholder Coup, the next iteration of the Global Conference on CyberSpace (GCCS2015) will...
View ArticleEnterprise Security vs. Nation State Threat Actors
The recently published Snowden/NSA/GCHQ slides regarding the Gemalto hack have caused quite a stir amongst security practitioners, board members and politicians alike. But the uproar is minor when...
View ArticleThe Right to Strike Back
As published on Norse on June 26, 2015. Last week, at the HiP Conference in Paris, there was a debate on whether or not it should be allowed to strike back when you are being hacked. Currently,...
View ArticleMissing in Action: Cyber Dictionary?
As published on Norse on September 22nd, 2015. I recently stumbled over an old issue that has shown no signs of being resolved: the lack of a normalized lexicon on Cyber Security. We can’t seem to...
View ArticleCyber Cease-Fire: US v. China
As published on Norse on October 6th, 2015 Interesting times indeed, now that the outcome of Chinese president Xi Jinping’s two-day visit to the White House last week has been made public. According...
View Article