, ,

Does Microsoft ignore the GDPR data subject rights?

Some acquaintances had their Hotmail e-mail accounts blocked by Microsoft because a Microsoft algorithm suspected that unauthorized users had accessed their e-mail accounts. For starters, I can only applaud that Microsoft takes measures to protect the confidentiality of the information stored in Hotmail mailboxes. However, the problems started when these acquaintances tried to re-access to…

Is Cybersecurity really on the agenda of the ICS community?

In November, Toreon (my colleague Vincent Haerinck and myself) attended the fifth LSEC annual Industrial Automation Security conference at the Antwerp Engineering Company. It was a nice one-day event with speakers from companies such as Airbus, Rhode Schwarz, SecurityMatters, Kaspersky, DutchSec, Secudea and Flowman. Topics covered included “Actual and future Industrial Cyber Security views on…

,

6 takeaways of the NIS regulation

So, we already learned from Youri’s blog that we are not just looking for good recommendations to stay in Serbia. Once we researched the right NIS (The Security of Network & Information Systems Regulations), I found that these were the 6 main takeaways for me: It’s a directive, not a regulation. Just reading the directive itself…

, ,

How not to google the NIS regulation

When looking for the EU Network and Information Security directives I found out that googling just ‘NIS’ does not reveal the hot potato I was looking for. The first page of the Google search results pointed me in the direction of Nis, a city in Serbia. Things to do, reviews from travellers, where to eat,…

, ,

New Whiteboard Hacking Training: Advanced and for Pentesters

One of Toreon’s key values is the gathering and sharing of knowledge. We try to encourage our own people to do this all the time and actively facilitate this. Knowledge grows exponentially when shared and combined with people of all knowledge levels, even if they come from different IT security domains. This made us realise…