Tag: Security

  • Open Security News week 13-2022

    Cyber security is a process, not a destination to arrive at. Designing a cyber security architecture for your use case is the process of choosing between “less safe” and “more safe” and continuing this process until you reach “safe enough” for the information you want to protect.

    (more…)
  • Open Security News week 11-2022

    FOSS inside does not mean the software is any better than proprietary software. We believe in open and simple cyber security solutions. Openness and transparency builds trust. There are no silver bullets when it comes to cyber security.

    (more…)
  • Open Security News week 7-2022

    Simple cyber security solutions. Openness and transparency builds trust. There are no silver bullets when it comes to cyber security. Risks will never be zero. Using complex and expensive cyber security solutions are not by definition better.

    (more…)
  • Open Security News week 5-2022

    Duplicating work wastes time, money, and energy. Reuse and improve solid cyber security knowledge. Avoid old mistakes and use new solid open security knowledge.

    (more…)
  • Open Security News week 3-2022

    Good cyber security solutions are open solutions. Transparency builds trust. Simple solutions that can easily be understand and studied are more transparent than complex proprietary cyber security solutions. Stop reinventing the wheel: Use proven open solutions to fight your cyber security challenges.

    (more…)
  • Open Security News week 1-2022

    Cyber attacks are likely to remain a significant risk. Using simple proven cyber security solutions to prevent and protect against cyber attacks should be your highest priority. Good simple solutions are open and transparent. Stop reinventing the wheel: Use existing solutions or build upon a solid foundation of open security  tools and knowledge.

    (more…)
  • Let’s just do it one more time

    Cyber Security is complex. So it is no surprise that companies get hit by major IT disasters due to cyber security incidents.

    Cyber security vendors often make things very complex. Too complex. Often they sell a lot of crappy expensive security software with security management cockpits and promise that all your risks are mitigated. However being hit by ransomware is no joke. 

    (more…)
  • The day after the GDPR: End of an Era?

    Maybe you have noticed it. Privacy is an issue. A bit strange since there is only 1 day left until the new EU General Data Protection Regulation (GDPR) will become fully enforceable throughout the European Union. So before end of May 2018 all organizations that process data of EU citizens must comply with this General Data Protection Regulation. So will the enormous amounts of privacy breaches be over?  Will all privacy and freedom fighters celebrate 25 May 2018 as the beginning of an new Era? (more…)

  • The Ultimate GDPR Checklist

    Maybe you have noticed it. Privacy is an issue. A bit strange since there are only 2 days left until the new EU General Data Protection Regulation (GDPR) will become fully enforceable throughout the European Union.

    So before end of May 2018 all organizations that process data of EU citizens must comply with this General Data Protection Regulation. Determining how to design and improve your systems to meet the GDPR is not straightforward. Due to the complexity of the GDPR document a lot of help is available. But be warned: Some tools that claim to help you will increase your privacy compliance problems instead of solving these. (more…)

  • The Art of managing privacy policies

    Maybe you have noticed it. Privacy is an issue. A bit strange since there are only 3 days left until the new EU General Data Protection Regulation (GDPR) will become fully enforceable throughout the European Union.

    So before end of May 2018 all organizations that process data of EU citizens must comply with this General Data Protection Regulation. Determining how to design and improve your systems to meet the GDPR is not straightforward. Due to the complexity of the GDPR document you will need to use privacy policies to control and manage privacy risks. (more…)