BLOG

CYBER SECURITY CLUSTER BONN MEMBERSHIP

I joined the Cyber Security Cluster Bonn and I am looking forward to bring in excellence with my work as well as gaining valuable knowledge from the Cluster and its other members.

  13.08.2020

 


TELETRUST MEMBERSHIP

I am official member of TeleTrust Pioneers in IT security.

  24.07.2020

 


UNPOPULAR FACT

Recently I was reading quite a lot of articles about reasons explaining why and how big organisations getting breached. The big elephant in the room is something nobody wants to talk about. It’s not the lack of resources, at least not when it comes to big firms. Sometimes it is also not just a zero day exploit that was crafted professionally. No. When it comes to cyber security, big companies tend to shift their focus on the compliance of one or even more than one security framework. Then they desperately try to shape their configuration and policies for a specific control to be, you guessed it, COMPLIANT. The fact of the matter is that most of the biggest companies that have been successfully attacked were compliant most of the time. Security vs. Compliance you’re doing it wrong. 

  19.07.2020

 


A HONEYPOT EXPERIMENT 

I set up 10 honeypots in a public cloud and let them run for 12 hours. Since they’re not detected (at least not by shodan) as what they really are, they have drawn attention by scanners / attackers world wide. I’m still not sure if it’s a good idea to deploy them in a DMZ or even an internal network for obvious reasons. But with the advent of more and more coming deception tools I came to the conclusion that small honeypots will be an essential part of networks in the future.

  19.02.2020