View from a small passage leading away from a church, kind of central to an old Munich district.
Blog
-
Plenumstreffen Sicherheitsnetzwerk München
Plenumstreffen 2015
Des Sicherheitsnetzwerkes München.
Am 22. Januar traf sich das Plenum des Sicherheitsnetzwerkes München.
Agenda der Veranstaltung, die von Peter Möhring, Leiter der Geschäftsstelle, und Dr Kathrin Jaenicke, geleitet wurde, beinhaltete im wesentlichen den Rückblick auf das vergangene Jahr wie auch die Perspektive auf das kommende Jahr.
(more…) -
Internet of Things powered by Ubuntu #IoT
Next to the available versions of Ubuntu for the Desktop, Server and the Cloud, Mark Shuttleworth announces a new version of Ubuntu for the Internet of Things. Snappy Ubunutu Core aims to provide a common firmware for “Smart, connected things” on ARM and x86, that introduces a new standard for update-ability and security.
via Mark Shuttleworth » Blog Archive » Smart things powered by snappy Ubuntu Core on ARM and x86.
-
Technology is not our destiny. #dld15
@amcafee: Technology is not our destiny. We shape our destiny.
🆕"Technology is not our destiny.
We shape our destiny."#dld15 @amcafee pic.twitter.com/bs4vCqivnk— Antonio Vieira Santos (@AkwyZ) January 18, 2015
via Twitter.
-
XSS with a book.
In Safari Books.
https://twitter.com/fmavituna/status/555769470321688576
-
Complex Processes
Observation
Organizations have to become more mature in their processes while they grow. While this is true for all types of organizations, my perspective is an IT and IT related one alone, also being part of other organizations. With complex technologies coming into every aspect of business, individual solutions are being provided by increasingly specialized vendors. With this, the number of service providers, managing products and – more importantly – solutions, the number of involved parties rises, which in turn increases complexity.
Problem
Now that setup of multiple parties involved requires organization to make it work properly. Processes need to be introduced, to track progress, make sure the right parties get the right information at the right time, and progress and outcome are trackable and manageable.
All of the requirements are clear to justify a strict process. Provided they are viewed from the right angle. Participants in the process, staff executing individual steps, have difficulties seeing the purpose.
Improvement
A transparent process is easier to follow for individual contributors. Management needs to feed back outcome of work, results to their staff. When everybody understand what he is doing, less steps will be done wrong. Eventually it will even take out complexity out of some processes, because transparency can help avoid the need for exceptions to be built in.
Please share your thoughts!
-
#DLD Campus Lecture Werner Vogels, Amazon CTO
Raum W201, LMU Lehrturm, Professor-Huber-Platz 2, 80539 München
-
Virtual Crime in Numbers
Süddeutsche Zeitung, Januar 10, 2015
“Sueddeutsche Zeitung” has an infographic on Internet related crimes. The numbers displayed are about services targeted by phishing, which is unsurprisingly lead by email, the number of malware circulating, monetary value of damages through criminal activity, most hacked passwords and finally origin of attacks. Source for these numbers are quoted on the bottom right: Bundesamt für Sicherheit in der Informationstechnik, Bundeskriminalamt, Kaspersky Lab and Deutsche Telekom.
-
Top Influencers in Security
Tripwire has a recommendation of Security Influencers to follow in 2015, along with their Twitter handle. While I second all of the recommendations, it is particularily notable that 3 out of these 15 names work – or have worked – for Akamai. These guys are @BillBrenner70, @gattaca and @JOSHCORMAN. Every individual on the list had the opportunity to answer, which infosec-related superpower he would unlock, which makes the list a bit of an entertaining read, too.
Top Influencers in Security You Should Be Following in 2015.
(more…)