October 27th, 2023, by
#1 Frequently Asked Security Question

As a CISO I’m often confronted with this question, although 'application' can also be replaced by ‘tool’, ‘device’, ‘software’, ‘hardware’, ‘IT solution’, or anything along those lines.

Read more
October 20th, 2023, by
People Centric Information Security – Part V

In this blog, I envision the information security process and deep dive into the first three steps.

Read more
September 29th, 2023, by
People Centric Information Security – Part III

In this blog, I will explain what information streams look like, and why they are so important to determine the value of information and realize information security.

Read more
September 26th, 2023, by
IoT Has a New Security Standard

We live in a world where the security of our networking and computing infrastructure is of prime important.

Read more
August 2nd, 2023, by
People Centric Information Security 

It is time to take business needs and people realizing business as the starting point for Information Security; People Centric Security

Read more
February 22nd, 2023, by
Passphrase or autogenerated password?

I have always been fascinated by the number of posts on various blogs with an article that is supposed to be about deciding between several options, and that after several paragraphs with little or no information, the conclusion is “it depends”.

Read more
January 20th, 2023, by
QA & the Metaverse #4 – Security

Though security is already a major component of the IT landscape today, its relevance and importance will only rise when talking about the metaverse.

Read more
November 25th, 2021, by
Vlog: Enterprise Scale Cloud Architectures

Enterprise-scale architecture aligns technical architecture conversations into eight critical design areas to quickly help organizations

Read more
October 20th, 2021, by
The Fragility of the Internet

At the start of October 2021 there was a disturbance in the Force, as if millions of voices suddenly cried out in terror and were suddenly silenced.

Read more
October 1st, 2021, by
Make your Azure PaaS environment security compliant in few easy steps

When working with Azure PaaS resources, we typically concentrate more on the code implementation part and external Azure Resources like Azure Application Gateway/Front door or Key vault to support Security of PaaS applications. But there are few basic things which are supported by Azure PaaS Resources to help us to tighten internal security, which we may tend to forget sometimes.

Read more
September 9th, 2021, by
How to secure your software supply chain with DevSecops

Vulnerabilities in software code come in many guises, and a new white paper from Sogeti and Microsoft argues that it would be wrong to focus your security efforts just on proprietary code.

Read more
September 8th, 2021, by
Security as Code – A Dynamic model to protecting your Digital Assets

Andy Grove famously wrote – ‘Only the Paranoid survive’ The message still makes sense and the only true solution to attacks is eternal vigilance.

Read more