Your security maturity is low? Are you using your people the best way you can?

One famous saying attributed to Steve Jobs must be: « it doesn’t make sense to hire smart people and tell them what to do; we hire smart people so they can tell us what to do. » It makes sense and security is no exception. How often do I see companies struggling to improve their level of […]

Why is usability important for security management?

Why is usability important for security management? Is it even important? Obviously for a lot of people, it is not. And that’s a problem. But what is usability anyway? Usability? According to Wikipedia, and I find the definition pretty accurate, usability is “the ease of use and learnability of a human-made object such as a […]

Is Cybersecurity a good buzzword?

For years now, Information security is a fast growing market. At least for a couple of years, the cyber security market is growing fast. Even in these times of budget cut in many sectors, quite often the cyber security department manages to negotiate an increase of its operational budget. That’s significant, isn’t it? Moreover, nowadays […]

Red team exercises are like vaccination against attacks?

Yesterday, I have been asked what exactly RTEs are and why are they useful? As I believe a good analogy worth a thousand words, I tried to find one than can be understood by any layman. The vaccine principle stroked me as the perfect one. Red Team Exercises principle is to launch an attack against […]

How to detect fake or stolen IDs?

Identification is one of the big challenges faced by security managers. It is a challenge when it comes to IT systems but even before that, to identify people. Even with the rise of national electronic identity cards (like eID in Belgium), fake or stolen IDs are still possible. Even better, you might just make a Google […]

%d blogueurs aiment cette page :