• Meet the things

    You enter your hotel room. It features a high-quality bed covered with soft linens and comfy pillows. A large flat screen television is mounted on the wall. The room is equipped with the latest air-conditioning system which allows you to set your desired temperature, and the lights can be perfectly dimmed to the desired levels to achieve the right atmosphere.

    Read More >
  • Simplify Identity Management By Removing The Need For Application Accounts

    Managing applications account cause major headaches for every authorization manager. Current solutions focus on insight and control. However, what if we simply remove the need for application account creation? Why do we need application accounts anyway?

    Read More >
  • Most businesses do not need an Einstein

    Most businesses do not need an Einstein. Yet, too many people try to look like one. The biggest threat to technology is its complexity. Complexity leads to lack of insight. To the inability for decision makers to make the right choices. Complexity leads to systems of bad quality. Complexity is something worth to avoid. But somehow, reducing complexity has become a complex task itself.

    Read More >
  • Internet of Things: Only things we are really interested in!

    Smart devices often require you to use a special app, to register a new account, and to install a hardware bridge. You need a Philips Hue Bridge for switching your Philips Hue lights on and off. You need a Nest Heat Link for controlling your home’s temperature with the Nest Thermostat. You need the August Connect for controlling your August Smart Lock remotely.

    Read More >
  • Not without a trace

    Maybe he became reckless. Although he must have tried to erase his tracks, a team of digital forensic experts revealed the identity of the intruder. It was Kenneth, a former contractor who was hired by the IT department to advise on the upcoming database migration. Kenneth turned out to be a smart guy. It also turned out he misused his expertise to read documents containing information about pending mergers and acquisitions. Top secret! He leaked this information. However, not without a trace.

    Read More >
  • Two-factor authentication is great, yet not ideal

    Two-factor authentication is not an ideal solution. Yes, multi-factor authentication improves security in comparison with most single-factor authentication solutions. However, it comes with a price. Not only can implementing a multi-factor authentication solution actually cost you quite a lot of money, it also risks compromising user convenience. More ideal solutions should exist.

    Read More >
  • Welcome to the future of the encrypted web

    Today, the organization Let’s Encrypt white-listed some of my domains in their beta program and sent me this welcome message. Now, I can make Let's Encrypt generate free HTTPS certificates to secure my web domains.

    Read More >
  • Welcome to the future of the encrypted web

    "Welcome to the future of the encrypted web". Today, the organization Let’s Encrypt white-listed some of my domains in their beta program and sent me this welcome message. Now, I can make Let's Encrypt generate free HTTPS certificates to secure my web domains.

    Read More >
  • Even The NSA Cannot Decrypt This Message

    Some think that the NSA is able to decrypt all of our network traffic and everything stored on our computers. Some think that spending billions on research and supercomputers eventually leads to the possibility of getting around any type of encryption. Some think secure encryption does not exist.

    Read More >
  • Do Not Blindly Trust Graphical User Interfaces

    We invest heavily in our fight against phishing: we teach our customers to keep their passwords secret; we install spam filters to prevent phishing emails from reaching our employees and we run courses to create awareness of spear phishing. We even have protected all our web applications with digital certificates.

    Read More >
  • Insider and privilege misuse? Digital fingerprints on your documents!

    Many organizations experience problems with employees leaking confidential information, accidentally or intentionally. Nevertheless, current identity and access management solutions focus on authorizations and access but provide little protection against insider and privilege misuse.

    Read More >