Cybersecurity
In this blog, I will explain what information streams look like, and why they are so important to determine the value of information and realize information security.
Read moreWe live in a world where the security of our networking and computing infrastructure is of prime important.
Read moreMore than five years ago, Andy Greenberg recounted how hackers had disabled his vehicle while he was driving 70mph in a Jeep Cherokee. The attackers, as a “friendly” demonstration, changed his radio station, turned on his wipers, blasted the AC and switched off the ignition.
Read moreAt the start of October 2021 there was a disturbance in the Force, as if millions of voices suddenly cried out in terror and were suddenly silenced.
Read moreWhen working with Azure PaaS resources, we typically concentrate more on the code implementation part and external Azure Resources like Azure Application Gateway/Front door or Key vault to support Security of PaaS applications. But there are few basic things which are supported by Azure PaaS Resources to help us to tighten internal security, which we may tend to forget sometimes.
Read moreAndy Grove famously wrote – ‘Only the Paranoid survive’ The message still makes sense and the only true solution to attacks is eternal vigilance.
Read moreAs IT professionals, we are all painfully aware of the need for high-quality security in the systems we work with and deliver.
Read moreOnce upon a time, kings and ministers were wealthy based on the kingdom, the size of produce and the taxes they could levy on it.
Read moreOrganizations view cybersecurity as a critical enabler for business growth. Creating a culture of improvement in security strategy is needed.
Read moreSecure code is important. What if a security issue is not found in your code but in one of your dependencies?
Read moreIn an era of cyber intrusions, security is an essential priority for every business. You own Windows 10, you implement the updates as they are released and you refresh your systems every 3 to 4 years. Are you ensuring you have taken the necessary steps to secure your workplace systems?
Read moreA pragmatic solution to improve the security of your organization in times of Covid-19.
Read moreTake a look at our most read and shared blog posts from February 2020
Read moreThomas Fillaud, VP, Global Head of Cybersecurity at Sogeti gives his six cybersecurity predictions for 2020 and says that there are many more; in a rapidly-changing security landscape.
Read moreSogeti Finland’s Test Expo 2019 was organized for the fourth time in Helsinki’s Clarion hotel. This year the theme of the testing conference was imagination. Like last year, there were two different tracks to choose from, QA and cybersecurity. In this blog post, I will share the ideas that caught my imagination during the conference...
Read moreBlockchain in 2019: Trends and the Future. Take a look here.
Read moreWe visited the conference #VINT2018 "In code we trust". Inspiration and great discussions on a hot topic at the moment: trust. Trust in products around us, trust in the governances using digital solutions for us, trust in data.In todays #IoTFriday we discus the day and talk to our VINT colleague Pepijn Pepping on the topics to come.
Read moreThe year 2018 starts with the big Consumer electronics show in Las Vegas: CES 2018. #IoTFriday takes a look on what trends can be discovered. We group the new introductions on CES2018 by technology. When there is no black out we read all the news and the first #IoTFriday of 2018 is reserved for a...
Read moreOne of the hottest new trends in the technology sector today is the Internet of Things (IoT). According to the McKinsey Global Institute the number of connected machines has increased by 300 per cent over the past few years. By 2025, the economic impact of IoT is estimated to range from US$ 2.7 trillion to...
Read moreBy deploying Watson for Cyber Security in the security operations center (SOC), analysts could accurately accelerate the analysis process by 50 percent, allowing staff to analyze significantly more information in a shorter amount of time, and enabling them to target and react to the most persistent threats immediately.
Read more