Using Technology to Defend Digital Privacy & Human Rights – Presentation Notes

If you attended my talk “Using Technology to Defend Digital Privacy & Human Rights”, thank you! Here’s a list of supplemental material discussed during the presentation as well as where you can find out additional information abou… Continue reading Using Technology to Defend Digital Privacy & Human Rights – Presentation Notes

What are the most valuable information when handling an IT security event/incident?

I’m currently looking into reporting processes in information security and I was wondering what kind of information should be reported when an IT security event or incident occurs.

The definitions of those would be (taken fr… Continue reading What are the most valuable information when handling an IT security event/incident?

What are the most common security threats that have to be considered when dealing with RDP?

I’m dealing with a hypothetical infrastructure for enabling workers to use RDP for remote access to their work PCs. These would be virtualized Win7 machines within a VMWare vSphere environment. Workers would have to use a VPN… Continue reading What are the most common security threats that have to be considered when dealing with RDP?