Cyber security is a complex field. It requires expertise of many different areas like business sciences and computer sciences. Security risks are difficult to manage and to control. Despite the costs and resources will be invested: major disasters due to security breaches are always possible. Simplification of security measurements, both tools and processes, is challenging but in the end always profitable.
(more…)Category: Security News
-
Open Security News week 10-2025
When using FOSS software you have the advantage to inspect the source code on malicious flaws. However almost all software is distributed to end users as pre-compiled binaries. This creates a problem: How do you know if the software is not injected with malicious code?
Compiling the software yourself is not enough to be sure that no flaws have been introduced. So check if your software has a reproducible build. A reproducible build is, an approach to determine whether generated binaries correspond with their original source code.
(more…) -
Open Security News week 8-2025
Cyber security is a key quality aspect that can not be integrated later in a product. You can not create a better security architecture when your product is finished. Security is a core product quality aspect that can not be added later. Security should be seen as a foundation quality aspect that is developed in parallel with your new product. You don’t have to be a genius to make cyber security simpler and better. Continuous learning is key!
(more…) -
Cyber Security Conferences
Cyber security conferences or seminars are crucial for continuous learning. But the number of annual held cybersecurity events is immense. So on this blog page you will find an opinionated collection of exiting cyber security events worldwide.
(more…) -
Open Security News week 49-2024
Security relies on understanding the present and past vulnerabilities within your hardware and software stack. Responsible software and hardware companies publish detailed information about known vulnerabilities. However, remember that the number of reported vulnerabilities for a product does never ever reflect its quality.
In fact, a lack of openly published vulnerabilities should raise suspicion, as transparency is a hallmark of trustworthy and secure products. The amount of vulnerabilities you can find for a product is not related to the quality. Distrust products that have no open published vulnerabilities.
(more…) -
Open Security News week 48-2024
Security is complicated. This is why open development is a key factor and a precondition for creating secure solutions. Security is getting more important every day. Also due to the development of machine learning applications many data driven solutions are poisoned with privacy related data. Transparency and openness increase security protection levels. A good security product should never ever introduce extra vulnerabilities. However many low quality security products increase your cyber risk profile instead of lowering.
(more…) -
Open Security News week 24-2024
We all deserve protection from abusive data practices like mass surveillance, browser tracking, demographic profiling, and data discrimination. Protecting privacy means preserving your and our digital autonomy, our freedom, and core democratic values. Technology will continue to enrich our lives and enable new possibilities for the future.
There should be no tension between digital innovations and maintaining your digital privacy. Good security is vital for good privacy. Using open, transparent and simple solutions is key to prevent unneeded data collections that impact our privacy and fundamental human rights.
(more…) -
Open Security News week 14-2024
Cyber solutions can be often simpler and far more effective. Most cyber security solutions are not future-proof and not maintainable in the long term. Most cyber security improvements programs end with more paperwork, more new fancy software tools without increased security resilience.
(more…) -
Open Security News week 9-2024
Good cyber security is and will be hard work. Almost every security professional uses the CVE system. But be cautious: The CVE system is broken and the database of existing CVEs is full of questionable content and plenty of downright lies. Cyber solutions can be often simpler and the best solution is rethinking if the solutions you use are really solutions. Frequently, numerous security solutions end up exacerbating security risks rather than mitigating them, sometimes making avoiding the solution altogether a more prudent choice. Why is good cyber security still so hard to accomplish?
(more…) -
Open Security News week 47-2023
Machine Learning (AI) is one of the most powerful technologies of our time. But machine learning is a complex technology that brings a lot of new cyber security and privacy risks. Cyber security is a field where commercial vendors of security solutions proclaim breakthrough innovations every week. But don’t fall for it: there is no magical new tool for old and new threats. Good cyber security is and will be hard work. Now and in times to come.
(more…)