Zero-trust security principles could protect against insider threat by treating every component, service, and user of a system as continuously exposed to and potentially compromised by a malicious actor. But is zero-trust really a good name for this concept? Naming things is hard and a bad name is fuel for confusion.
Continue reading “Open Security News week 30-2022”Open Security News week 21-2022
Reducing complexity for information security means following key proven principles. Some key principles for simplifying security are e.g. prevention of security risks is easier for maintenance and good simple up-to-date documentation always helps. Bring it down to the crucial things.
Continue reading “Open Security News week 21-2022”Open Security News week 17-2022
Cyber offences, such as hacking, malware creation and distribution, and online fraud, present a substantial threat to organizations attempting to safeguard their data and information. Open and simple cyber security solutions always help.
Continue reading “Open Security News week 17-2022”Open Security News week 13-2022
Cyber security is a process, not a destination to arrive at. Designing a cyber security architecture for your use case is the process of choosing between “less safe” and “more safe” and continuing this process until you reach “safe enough” for the information you want to protect.
Continue reading “Open Security News week 13-2022”Open Security News week 11-2022
FOSS inside does not mean the software is any better than proprietary software. We believe in open and simple cyber security solutions. Openness and transparency builds trust. There are no silver bullets when it comes to cyber security.
Continue reading “Open Security News week 11-2022”Open Security News week 7-2022
Simple cyber security solutions. Openness and transparency builds trust. There are no silver bullets when it comes to cyber security. Risks will never be zero. Using complex and expensive cyber security solutions are not by definition better.
Continue reading “Open Security News week 7-2022”Open Security News week 5-2022
Duplicating work wastes time, money, and energy. Reuse and improve solid cyber security knowledge. Avoid old mistakes and use new solid open security knowledge.
Continue reading “Open Security News week 5-2022”Open Security News week 3-2022
Good cyber security solutions are open solutions. Transparency builds trust. Simple solutions that can easily be understand and studied are more transparent than complex proprietary cyber security solutions. Stop reinventing the wheel: Use proven open solutions to fight your cyber security challenges.
Continue reading “Open Security News week 3-2022”Open Security News week 1-2022
Cyber attacks are likely to remain a significant risk. Using simple proven cyber security solutions to prevent and protect against cyber attacks should be your highest priority. Good simple solutions are open and transparent. Stop reinventing the wheel: Use existing solutions or build upon a solid foundation of open security tools and knowledge.
Continue reading “Open Security News week 1-2022”Let’s just do it one more time
Cyber Security is complex. So it is no surprise that companies get hit by major IT disasters due to cyber security incidents.
Cyber security vendors often make things very complex. Too complex. Often they sell a lot of crappy expensive security software with security management cockpits and promise that all your risks are mitigated. However being hit by ransomware is no joke.
Continue reading “Let’s just do it one more time”