Discover
Communities
Decks
Login
Discover
Communities
Decks
Buy perks
Login
Signup
25
larshilse
Available
Used
Resource Credits
3 Followers
0 Following
January 24, 2019
RSS feed
Posts
Blog
Posts
Comments
Communities
Wallet
Mute
larshilse
cybercrime
5y
Publications on Cybersecurity by Lars Hilse
Threat Assessment: BitcoinDanger to the United States' National Security and her Economic and Commercial Interests ISBN 978-1-489-52959-6 SHUT UP! And get a profitable Social Media Policy $14.3 million
$ 0.000
2
larshilse
cybersecurity
5y
Speeches and Panels on Cybersecurity by Lars Hilse
Keynote: Non-Geo Warfare (Space and Cyber): National Security Implications The International Defence Exhibition and Seminar (IDEAS) | Karachi, Pakistan (2018) Expert at the Hearing: The Security of Critical
$ 0.000
3
larshilse
acrac
5y
Your cloud software solution should have an offline version for business continuity purposes
That an increasing amount of corporations were pressing users, and corporations to move to what is now known as the cloud. Back then the associated services were referred to as software as a service/ S
$ 0.000
1
1
larshilse
digitalethics
5y
Lessons learned from the internet: from creation to finish, what what not to implement into autonomous driving and the smart grid
The first thing that comes to my mind when I think of the internet and its advancement is that we should have done a much better job in securing it against… well pretty much anything going amok today.
$ 0.000
2
larshilse
acrac
5y
Why a detailed network documentation is essential?
More often than not when I walk into a building I will see RJ-45 network outlets in the wild. Without having done exact calculations I was able to hook up my laptop to this outlet, and have full access
$ 0.000
2
1
larshilse
acrac
5y
Printers should be segregated from the rest of the network
When it comes to security risks for networks, hardly anyone will think of a printer as an existential threat to an organization. However, multiple cases proving that printers, and other IOT devices can
$ 0.000
1
larshilse
ipaddress
5y
Why it’s a bad idea to have your device’s IP address publicly visible!
You know how you walk into an office building, and the machines standing around have stickers on them with their IP address clearly visible to the general public? Well, thank you for that! You just saved
$ 0.000
1
larshilse
cloudcomputing
5y
Do encrypted cloud backups have benefits I’m missing?
n fact, they do! Unless you are set in a very dynamic environment, where a lot of changes to files in operational Infrastructure happens You have probably follow the trend, and have a cloud-based back
$ 0.000
1
larshilse
cloudstorage
5y
The data you store in the cloud must be segregated from that of other clients
One of the most problematic issues that is going to strike us in the near future is the cross infection of systems. Currently there are no sane arguments to support insisting on a totally isolated the
$ 0.000
1
1
larshilse
acrac
5y
Why you should isolate un-patchable, end-of-life software
And another blog post from the recent past I outlined why a patch policy and an update policy maybe critical for survival of an organization. On rare occasions, and actually more often than desirable critical
$ 0.000
1
1
larshilse
accesslimitation
5y
Physical access to data is restricted?
Justifiably you have the questions poking around in your head about why you should limit physical access to data? The answer is quite simple::: first of all let’s start with a definition of what I actually
$ 0.000
1
larshilse
intelligence
5y
Police Proof local storage/raid proof
If you years ago I was contacted by an internationally operating law firm. They had very special requirements as to their data protection. I never did ask about the emphasis they had towards their clients
$ 0.000
2
1
larshilse
digitalethics
5y
EU media’s misinterpretation on espionage and human rights violations in the digital realm
When nation states spy on other nation states that’s called espionage. When nation states spy on the populace of an entire nation; that is a human rights violation! So when the Snowden revelations were
$ 0.000
1
larshilse
acrac
5y
What Active Directory backup do you pursue?
So one of the most hardest things to back up regularly is going to be here active directory. Due to the complex and constantly changing environment this otherwise great piece of software is set in makes
$ 0.000
1
larshilse
cctv
5y
Your servers and critical infrastructure elements should be in an unmarked, locked room with access control and access log as well as CCTV
It regularly makes you wonder how many organizations have their servers and other critical infrastructure in rooms marked clearly as the server and communication room. When confronted with a question why
$ 0.000
1
larshilse
acrac
5y
Why you need a patch and update policy, and protocol
But it appears that one of the main reasons for malware, rent somewhere, and other dubious software is able to spread so quick within organizations is due to the fact that systems call police servers are
$ 0.000
1
larshilse
cybercrime
5y
Protecting your organisation from the risk of social engineering
Social engineering describes the process by which an attacker gains access to a facility or system by manipulating someone to grant them access they shouldn’t have in the first place. When speaking
$ 0.000
1
larshilse
ceofraud
5y
Protecting your organisation from CEO fraud
One of the most costly cyber threats/risks is CEO fraud. The attackers impersonate a senior representative of the company by email mostly. With a shady excuse they will get in touch with a resource
$ 0.000
1
Follow, be first to know
Nothing found in posts.