In certain areas, getting security right can seem to be very easy. But, hmm, let’s look at this: Poorly anonymized logs reveal NYC cab drivers’ detailed whereabouts. They used MD5 to anonymize the license plate numbers of the taxi drivers â€“ and they did not use any salt. So, it is fairly easy to run…Details
The Dutch TV broadcaster VPRO made a great video (about 50 minutes) about zero-days and security leaks for sales.
It raises really good social questions about the role of governments and citizens. Really worth looking at.
- ‘Zero Days’, the documentary (f-secure.com)
During the Global CISO Summit we ran this week, one theme was high on the list for a lot of CISOs: Zero Trust. Besides, what is out there, we just released different material how we think about it and how you can approach it: A landing page with a lot of great material: Zero Trust…Details
As you might know, I am part of the Cybersecurity Advisory Board of the Swiss Academy of Engineering Sciences here in Switzerland. In this capacity I had the opportunity to publish an article at Inside IT: SATW insights: Zero Trust – Sicherheit in Zeiten von Homeoffice (in German).
Zero Trust is definitely not new but around for something like 16 years if you look at it. This is, when the Jericho Forum was formally established and Network Access Control architectures started to get deployed (or at least designed). It definitely got some tailwind 10 years later with Google’s work on BeyondCorp (as a…Details
During these days with a lot of people in their Home Office, discussions around Zero Trust are more important than ever as this journey enables scenarios like we see today. There are different resources, which might be interesting for you to look at: Microsoft Zero Trust assets These are links to currently available assets. We…Details
In my last post we looked into why Zero Trust is not this huge revolutionary vision but something reflecting today’s reality. Technology is ready to go –technology is ready for you to embark on a journey and start to align your security architecture and investments with this approach. The biggest change when implementing Zero Trust…Details