Social Media as a Cyber Warfare Gamechanger
September of 2012 will live on in infamy for a large number of people. It was the month of the massive riots by Islamic extremists who, incited by the ever present radical imams, stormed several US...
View ArticleThe Case for National Cyber Labs
Recently I received a most interesting link from a friend, about a tiny city that was actually a perfect working model of a real-life city built by the SANS Institute. It had real banking networks,...
View ArticleOn Iran and Pre-Emptive Cyber Attacks
Early in February of 2013, many news outlets came out with articles about the US Government having a ‘secret legal review‘ on the use of its cyber-arsenal. This legal review concluded that the US...
View ArticleThe Chilling State of Cyber Affairs
With all the attention pointed towards PRISM, another interesting publication was virtually overlooked. Earlier last month, a taskforce belonging to the US DoD’s Defense Science Board (DSB) released a...
View ArticlePRISM: Tip of the Cyber Intel Iceberg
When Edward Snowden published information on PRISM – a rather drastic intelligence gathering program in which several (assume All) government agencies such as the FBI and the NSA draw intelligence from...
View ArticleArgent Consulting buys B-Able Argent Consulting
PRESS STATEMENT Monday, 26th May 2014. The Netherlands: Due to insurmountable differences among management, the joint effort between Argent Consulting and B-Able, dubbed “B-Able Argent Consulting” has...
View ArticleInformation Security, Post-Snowden
As published on Tripwire’s State of Security: The revelations regarding the extensive digital intelligence gathering programs of the American National Security Agency by Edward Snowden won’t have...
View ArticleUsing the Cyber Kill Chain to Map Cyber Defenses with Practical Reality
In an effort to better understand the structure and approach of “APT Attacks”, which was at the time virtually a euphemism for cyber-attacks coming from China, researchers investigated hundreds of...
View ArticleGCCS 2015: Battlefield for the Internet’s Multi-Stakeholder Coup (Part I)
Published on Norse Corp on Jan 21st, 2015 As you may already be aware, the next iteration of the Global Conference on CyberSpace will be held on April 16th and 17th in The Hague, the Netherlands this...
View ArticleEnterprise Security vs. Nation State Threat Actors
The recently published Snowden/NSA/GCHQ slides regarding the Gemalto hack have caused quite a stir amongst security practitioners, board members and politicians alike. But the uproar is minor when...
View ArticleThe Right to Strike Back
As published on Norse on June 26, 2015. Last week, at the HiP Conference in Paris, there was a debate on whether or not it should be allowed to strike back when you are being hacked. Currently,...
View ArticleCyber Cease-Fire: US v. China
As published on Norse on October 6th, 2015 Interesting times indeed, now that the outcome of Chinese president Xi Jinping’s two-day visit to the White House last week has been made public. According...
View Article