FOSDEM 2019: Designing better cryptographic mechanisms to avoid pitfalls – Talk by Maximilian Blochberger

At FOSDEM 2019, Belgium, Maximilian Blochberger talked about preventing cryptographic pitfalls by avoiding mistakes while integrating cryptographic mechanisms correctly. Blochberger is a research associate at the University of Hamburg. FOSDEM is a free… Continue reading FOSDEM 2019: Designing better cryptographic mechanisms to avoid pitfalls – Talk by Maximilian Blochberger

‘Computing technology at a tipping point’, says WEF Davos Panel

The ongoing World Economic Forum meeting 2019 has seen a vast array of discussions on political, technological and other industrial agendas. The meeting brings together the world’s foremost CEOs, government officials, policy-makers, experts and a… Continue reading ‘Computing technology at a tipping point’, says WEF Davos Panel

Go Phish! What do thieves get from stealing our data?

If black hats were sharks, then our emails would be a school of innocent, unsuspecting guppies nonchalantly drifting along. For black hats or malicious hackers, getting into the average person’s email is as challenging as overeating at a buffet. … Continue reading Go Phish! What do thieves get from stealing our data?

Go Phish! What do thieves get from stealing our data?

If black hats were sharks, then our emails would be a school of innocent, unsuspecting guppies nonchalantly drifting along. For black hats or malicious hackers, getting into the average person’s email is as challenging as overeating at a buffet. … Continue reading Go Phish! What do thieves get from stealing our data?

An Interview with Juan Muñoz: Analysing the risk environment for Spanish companies

The following interview was published in the September 2018 edition of the AIG Spain Newsletter. Since 2011, NYA has been retained by AIG to respond on a number of special risk and crisis management policies. The combined crisis management model a… Continue reading An Interview with Juan Muñoz: Analysing the risk environment for Spanish companies

Key trends in software infrastructure in 2019: observability, chaos, and cloud complexity

Software infrastructure has, over the last decade or so, become a key concern for developers of all stripes. Long gone are narrowly defined job roles; thanks to DevOps, accountability for how code is now shared between teams on both development and dep… Continue reading Key trends in software infrastructure in 2019: observability, chaos, and cloud complexity

Hackers are our society’s immune system – Keren Elazari on the future of Cybersecurity

Keren Elazari, a world renowned cybersecurity analyst and senior researcher at the Tel Aviv University Interdisciplinary Cyber Research Center, author and speaker spoke earlier this year at Six, about the future of cybersecurity and a range of real wor… Continue reading Hackers are our society’s immune system – Keren Elazari on the future of Cybersecurity

Dark Web Phishing Kits: Cheap, plentiful and ready to trick you

Spam email is a part of daily life on the internet. Even the best junk mail filters will still allow through certain suspicious looking messages. If an illegitimate email tries to persuade you to click a link and enter personal information, then it is … Continue reading Dark Web Phishing Kits: Cheap, plentiful and ready to trick you

5 lessons public wi-fi can teach us about cybersecurity

Free, public Wi-Fi is now crucial in ensuring people stay connected where a secure network is absent or mobile data is unavailable. While the advantages of flexible internet access are obvious, the dangers are often less clear. By now, most of us are a… Continue reading 5 lessons public wi-fi can teach us about cybersecurity