Author Archive

Critical infrastructures under daily attack — EU cyber security team head

https://horizon-magazine.eu/article/critical-infrastructures-under-daily-attack-erncip-head-georg-peter_en.html ‘Critical infrastructures around the world, not just in Europe, are constantly being targeted by cyber attacks, as are many other systems used by society which are internet-connected. Every day, European vital services and infrastructures have to be able to resist many types of cyber attacks. ‘The risk of attacks against such infrastructures is expected

Exploring the open development method | Opensource.com

https://opensource.com/business/15/11/open-development-method?sc_cid=7016000000127ECAAY Among the most “oversold as a cure” methodologies introduced to business development teams today is Scrum, which is one of several agile approaches to software development and introduced as a way to streamline the process.  Scrum has become something of an intractable method, complete with its own holy text, the Manifesto for Agile Software Development, and daily devotions

When your Employer Can See Your Banking Information: Decrypting SSL | AlienVault

https://www.alienvault.com/blogs/security-essentials/when-your-employer-can-see-your-banking-information-decrypting-ssl Enter Next Generation firewalls and SSL Decrypts. In the traditional catchup game played between good guys and bad guys, the end user usually ends up in the thick of the action. With SSL decryption, that padlock might not be protecting you at all. First let’s take a look at how SSL decryption is setup.