NoSQL prevalence

A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views and other objects. It’s also a framework for frustration.Trying to get a grip on data organized into a model of aspects in a way that supports processes requiring information, such as modelling the availability of rooms in motels in a […]

Read More NoSQL prevalence

Breaches gone wild

Halfway past 2016 and news on breached data from social media sites has been hitting us constantly. Massive data dumps has been released into the wild, and they come with a hefty price tag for those willing to pay. Data from anything between small to big fat juicy players have been disclosed – and guess what? Most […]

Read More Breaches gone wild

A history lesson on SSL and TLS

This blog post will totally change the way you look at SSL and TLS. It will be story of war, love, betrayal and dragons. As a direct follow-up on my post “HTTPS is DROWNING“, may I present you the history of SSL and TLS (and HTTPS)! SSL history lesson Once upon a time in a country […]

Read More A history lesson on SSL and TLS

Anonymous Operations and interventions

Based on the recent terrorist attack on Paris – France – Anonymous has set out a new operation fighting ISIS by knocking out their online communications lines. They launched the operation on YouTube – like any other operations they’ve launched. Just to name a few operations from current year: Operation Charlie Hebdo: shutting down Islāmic terrorism online. Operation […]

Read More Anonymous Operations and interventions

Google your own organization

Welcome to National Cyber Security Awareness Month 2015. Or as I would put it – Business as Usual. Today’s topic is online presence and what attackers can find out about your organization. Often companies bring in expertise to improve their online presence. You know the drill. Establish Twitter and Facebook comlines. Improve the current website. Anything […]

Read More Google your own organization

Fake recruiters on LinkedIn

According to SecurityWeek News the LinkedIn accounts of security specialists have been bombarded lately with recruitment requests from numerous fake accounts. Supposedly someone are trying to map out their networks. The fake recruiter accounts follow the same template using an image of an attractive woman to lure the specialists in. Those same profiles are also sprinkled […]

Read More Fake recruiters on LinkedIn