The best training is … no training (or the value of building intuitive systems like ours!)
Some weeks before, in that period that Germans call “Sommerloch” (good question how to translate this in English: something like a summer gap might make sense…) we had the opportunity to look to some other projects, and how they support [...]
Vulnerabilities in organisations websites
Many web sites and electronic infrastructures of organisations have various security vulnerabilities and are subject to cyberattacks with significant consequences on organisations. Successful cyberattacks lead to consequences which have a direct impact on organisations’ infrastructure, leading to Malfunction of the [...]
Identifying Cybersecurity Anomalies with Risk Potential
When aiming to monitor an organization’s security 24/7, apart from breaches and attacks that are detected by existing tools, IT security specialists are interested in potential anomalies that seem transitory within IT systems. Sometimes such anomalies are just a random [...]
System dependency workshop in Larissa and Rome – Context and procedures
In October this year we concluded the third round of a series of three one week long systems and dependency analysis workshops. A one week long workshop was held in Larissa and in Rome, with the purpose of identifying potentially [...]
Who does my Android phone tell about me? Looking at the BLOKADA log file
Blokada is a program, which sets itself up as a VPN. Think of a VPN like a street your data passes through before entering the highway of the Internet. Blokada looks for traffic to and from addresses related to advertising [...]
InnoSec presents CS-AWARE in the FOSSCOMM 2018 conference
InnoSec participated in the FOSSCOMM (Free and Open Source Software Communities Meeting) 2018 conference that took place on Crete island, Greece between the 13th and 14th of October 2018. FOSSCOMM is the Panhellenic conference of free and open source software [...]
The market for cybersecurity is very active
The market for cybersecurity is currently very active, and especially companies that are providing services in the detection and reaction phases of the cybersecurity cycle are a hot commodity right now. According to a recent article in TechCrunch, within one [...]
Sigma language rules for SIEM
Motivated by the sudden growth of interest in Security Information and Event Management (SIEM)mechanisms worldwide, companies that develop cybersecurity products started building their own SIEMsolutions as soon as possible. Due to market share competition, each of these companies developedtheir own [...]
A skeptical view…
Just a thought, as we look at other possible competitors, etc. in cybersecurity, it’s best not to forget and keep a skeptical view of many “commercial” claims. Read –and enjoy! – this latest report from ProPublica, an independent and nonprofit [...]