Trustworthy Computing just released two papers on current issues:
Determined Adversaries and Targeted Attacks Whitepaper
This paper shares Microsoft’s insights into the threat that Determined Adversaries and Targeted Attacks pose, identifies challenges for organizations seeking to combat this threat category and provides a context for other papers that will directly address each of those. . . . → Read More: Two Papers on Current Issues
You should spend 15 minutes on this TED talk – really worth it!!
A while ago, when I was travelling a journalist told me that he never pays for our software as he can easily download a tool to crack Windows XP (he was still running XP). We had an interesting discussion afterwards (besides the fact that he showed me how he steals our goods) about security. He . . . → Read More: Security Implications of Pirated Software
Wow, that’s an interesting question:
Let’s say a Canadian flies from New York to Tokyo on Korean Air and hacks the German tourist’s computer seated in front of her while over the Pacific. Who’s laws apply? (Canada, US, Japan, Korea, Germany?)
I mean, we have a hard time answering this question if everybody . . . → Read More: Hacking on the plane: who has jurisdiction?
Yesterday we all had a very long day: We hosted the EU Cybersecurity and Digital Crimes Forum in Brussels. At lot of government elites from all across Europe attended and were part of very intense discussions. It was obvious that people really are serious about cyber-whatever and that actions are being taken. I think that . . . → Read More: Tackling Cybersecurity Together
l am still sitting in the parliament room of the Council of Europe at the celebration event for the Budapest Convention. It was another very good event advancing the challenges fighting Cybercrime. Let me try to summarize a few thoughts:
The Budapest Convention is probably the best convention out there allowing a wide adoption of . . . → Read More: Council of Europe Octopus Conference- Some Thoughts
A lot of governments all across the globe are working on starting, restarting or pushing their Cybersecurity initiative. What often concerns me is, that the last real headline has more impact on the strategy and the themes to be addressed than a structure or a plan or a strategy.
This made us thinking about what . . . → Read More: Cybersecurity–More than a good headline
This paper by the Geneva Centre for the Democratic Control of Armed Forces (DCAF) was just brought to my attention. A piece of work, which is definitely worth working through. It lays out the problem space and then does a deep dive into the different sections:
Governments Legislative Bodies The Armed Forces Law Enforcement Judges . . . → Read More: Cyber Security: The Road Ahead
I often read two kinds of articles when it comes to ISPs and protecting privacy. In side asks for as much privacy as possible, the other one for transparency to fight cybercrime. What is our real goal? What is the role of ISPs in fighting crime? An interesting study by the OECD in comparison with an article I read today. . . . → Read More: Fighting Crime and Protecting Privacy–a Contradiction?
I blogged about my attendence at the above mentioned UNODC meeting. This is a short summary on how I preceived the meeting. . . . → Read More: Conclusion on UNODC: Open Ended Expert Group on Cybercrime