Biometric verification/authentication isn’t as safe and robust as you’re being led to believe. Fingerprint scanners are commonplace on laptops, phones and tablets but be vigilant.
Zero Trust (ZT) was heralded as a disruptive network architecture that would finally put an end to internal threats. It was also supposed to bridge the security gap between implicitly trusted internal network zones and untrusted perimeter defences.
Today I found out that on behalf of SecbÃ¼ro Labs, I have been selected as a contributing cybersecurity expert for a 144 page special edition of Hackin9 & eForensics magazines titled “Predictions for Cybersecurity in 2016”.
Last week I was in Berlin attending the Cloud Security Alliance Congress EMEA 2015, where I had the opportunity to meet some very interesting security specialists in visualization, cloud, telecom and networking sectors.
With an influx of security bulletins for Android-based devices, I decided to install antivirus software on my Android phone as a precautionary measure. However, the experience was anything but ideal — poor performance and high battery consumption. While security has a price on any platform, battery powered devices suffer far more because they can only […]
Last year I updated my PGP public encryption key to 4096 bits since it now looks as though it may be possible to crack a 1024 bit key within my lifetime. Not that I have many secretes, but those that I do, I intend to keep out of prying eyes. And unless quantum computers start […]
After many years of work with clients across Africa and the Middle East I decided to join a large research organization, more specifically, Huawei’s European Research Center (ERC) headquartered in Munich. I figured that researching security and digging deeper into the cloud would not only give me a chance to put my field experience to […]
Multi-billion dollar Oil & Gas companies are being targeted by a new generation of intelligent and destructive computer viruses that are capable of collecting sensitive information and are capable of destroying entire computer ecosystems. On August 15, Saudi Aramco, the world’s largest Oil & Gas producer based in Saudi Arabia, admitted that it was targeted […]
New digital snooping laws being discussed in the U.K. and U.S. are generating a lot of negative sentiment from advocates of privacy and human rights groups. The new surveillance laws would allow service and platform providers to collect, store and even sell data to third parties and permit its perusal by various security services. In […]
I’m not exactly sure when terrorist phobia started becoming part of the general aviation landscape, but I’m pretty sure it had something to do with 9/11. A prime example of how the few bad eggs can spoil it all for the rest of us. The US, with its finite wisdom, has managed to spread most […]