US Senate Committee on Blockchain

On August 21st, 2018, the U.S. Senate Committee on Energy and Natural Resources held a public hearing on Energy Efficiency of Blockchain and Similar Technologies. The purpose of the hearing is to consider the energy efficiency of blockchain and similar technologies and the cybersecurity possibilities of such technologies for energy industry applications. In particular, should we expect

Embracing the Charter of Trust

The Charter of Trust, an initiative of Siemens AG, was introduced during the 2018 Munich Security Conference and offers baseline standards for Cyber Security. The Charter of Trust recognizes that the digitalization of our society, factories and infrastructure must evolve hand in hand with Cyber Security. As the network of partners committing to the Charter

Back to the Future Cyber Security – Chapter 5, Episode 2: Access denied

Thumbs up when Cyber Security is done the right way! When Cyber Security is done the right way, we see a combination of a team taking their responsibilities serious, and a team which is using technology as part of the solution and not as goal. That is the only way to do the right things

Back to the Future Cyber Security – Chapter 5, Episode 1: PS phone home

There are plenty examples of where Cyber Security failed and how expensive that could be. It is good that we point out these problems, especially when they could have been prevented. And there is another reason to expose Cyber Security issues and hacks. As a recent poll among Twitter users shows, trust in organizations and

Marketing anecdotes and why the cloud is called the cloud

There are some pretty cool anecdotes about great marketing campaigns which started with an unintended statement or misunderstanding. Some of these anecdotes might not reflect the actual events or are twisted a bit to make the story cooler but isn’t that what anecdotes are all about? These are my favorite marketing anecdotes and let’s start why the cloud is called the cloud!

Facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Cyber Security – Community polls

Experts inform us about the latest developments in the field of Cyber Security and where these developments might lead to, or not. Of course it is very interesting to follow these updates and opinions on the various channels but it is just as interesting to ask the community what they think is important Cyber Security wise. And what better platform to do so than using Twitter polls?

Facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Back to the Future Cyber Security – Chapter 4, Episode 3: Expensive Ransomware

*WARNING* These are real incidents from the field and could scare you. A lot! *WARNING* The plant was still looking new after 3 years of operations, nothing like its sister plant which had a history of 25 years and was still going strong. New equipment, new technology and lights everywhere. Just this bright environment with

Back to the Future Cyber Security – Chapter 4, Episode 2: When unauthorized access and unqualified people team up to cause havoc

*WARNING* These are real incidents from the field and could scare you. A lot! *WARNING* Liquid aluminium has 3 very dangerous characteristics. It is extremely hot, aggressive to most materials including other metals and responds explosive when in contact with water. Three reasons to be extremely careful when handling liquid aluminum. Safety precautions are important,