Blog

Trends in Financial Crimes

High-tech professional criminals are getting ever more clever Malicious attacks on databases and incidents of online and other tech-related thefts continue to evolve in number and manner leaving both consumers […]

NYS CyberSecurity Conference 2013 – Social Media & Cloud Computing Threats to Privacy, Security and Liberty – A Global Perspective – June 4 2013

http://www.dhses.ny.gov/ocs/awareness-training-events/conference/2013/index.cfm June 4, 2012, 3 PM   Following on the heels of the critically acclaimed NCSC.NL presentation, we look at how Governments, Corporations and Private Citizens are using Cloud Computing, […]

Is there any harm in continous surveillance?

For years, clients asked us what was the REAL cost of non-compliance (with HIPAA, PCI, etc).  Thankfully, Dr. Ponemon & his team put some real numbers to the cost of […]

Laptop, Smartphone – what's the difference?

What’s the difference between your laptop and your smartphone? When it comes to information leakage, not much. As the Wired article shows, cell phone wipes leave almost as much data […]

Peter Teffer interviews Raj Goel

After the NCSC 2013 presentation, Peter Teffer interviewed me.   Here’s a (very poor) Google translation of his original Dutch article If we do not ask, we will not get. […]

NCSC Conference 2013

850 people from 12 countries NATO personnel, Military lawyers, Europol, Private Sectors, US DHS and FBI…all gathered in the Conference Center at The Hague. Best conference I’ve been to in […]

Michael Ahti – How China controls the internet

The NCSC conference 2013 was an amazing event #1   Michael Ahti’s presentation on how China controls their internet (and how other countries are copying their model) was education and […]

De Volkskrant – Beware The Little Sisters

The NCSC conference 2013 was an amazing event #2   My presentation went over well – got lots of kudos and De Volkskrant selected it as one of their favorite […]

Facebook likes considered key evidence in terrorist plot

Congress passed the Patriot Act to help law enforcement foil terrorists. The National Security Letter provision made it significantly easy for the FBI to gather data from web hosts, telecom […]

Admit to being an Athiest, go to jail

The internet (and subsequently, Social Media) have been touted as tools that promote democracy, openness and a civil society. More and more, these tools are being used by Governments, Corporations […]