BruCON is an annual IT-security conference, held in the historical lecture hall of the University of Gent in October. As a smaller-scale conference without focus on a specific topic, it aims to improve the general state of the information security industry. This year marked the 10th anniversary of its current form, Continue reading “BruCON 0x0A”
it-sa 2018 – Impressions and Trends
Last week, DCSO’s TSE team visited the annual it-sa fair & conference taking place at the Nuremberg Exhibition Centre from October 8 to 11 in order to stay up-to-date with recent trends and innovations in the cybersecurity space. Being a leading IT security conference in the DACH region, it-sa is a meeting place Continue reading “it-sa 2018 – Impressions and Trends”
User and Entity Behavior Analytics
Uncovering unknown threats in an enterprise environment might be one of the most significant challenges that security operations centers have to handle. To target possible attack vectors and fraudulent activities, arising in connection with malicious user behavior, companies usually employ Continue reading “User and Entity Behavior Analytics”
UP18 – it-sa’s cyber startup pitch contest
For the first time, the largest German cybersecurity conference it-sa was started by a warm-up event to get into the conference groove. Initiated by the it-sa team, the Digital Hub Cybersecurity and the Bavarian IT Security Cluster, and based on a concept that by now can be considered established, sixteen IT Continue reading “UP18 – it-sa’s cyber startup pitch contest”
Thoughts on the Equifax 2017 Breach Report
The United States Government Accountability Office (GAO) recently released a report on the 2017 Equifax data breach. The GAO report documents a number of shortcomings in Equifax’s infrastructure and can be used to identify lessons that should be learned.
Continue reading “Thoughts on the Equifax 2017 Breach Report”
Data in mysterious places – the subtle crisis of data harvesting apps
Recent news stories highlight the danger of unwanted data exfiltration by popular applications. The use of apps is increasingly important across working environments; recognizing the potential threat that they pose and implementing appropriate safeguards tailored to organizational needs is critical.
Continue reading “Data in mysterious places – the subtle crisis of data harvesting apps”