Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
A public beta version of our RRAS Detector is here
November 25, 2020
After extensive internal development and testing, we now proudly present our public beta version of a Syspeace detector for Microsoft Routing and Remote Access Service. What is Routing and Remote Access Services? “RRAS”, as it is often known, is a component in Windows Server to provide a VPN so that internal servers can be accessed […]
Read more
How to get the next generation to become professional cyber defenders
November 10, 2020
October has ended and so has the EU’s annual advocacy campaign “European Cybersecurity Month (ECSM)”. The campaign aims to raise awareness of cybersecurity threats. That includes promoting cybersecurity among citizens and providing up to date security information through education and good practices. Hundreds of cyber-related activities are organized throughout Europe every year during this month. Unfortunately, […]
Read more
DevSecOps – Where Collaboration is key
October 26, 2020
We hear many people talk about DevOps and SecOps. The DevOps wants to develop a strategy that bridges the gap between software development and IT operations. The team works with design, development, testing, implementation or deployment and maintenance. Security is normally introduced in the later stages. Somewhere between testing and deployment or even later. But […]
Read more
Is the NIST Cybersecurity Framework for me?
October 14, 2020
As cybersecurity continues to increasingly be at the top of everyone’s mind, the knowledge about how brute force attacks directly is linked to business risk is growing. Mitigating these risks does not solve the complete problem but it lowers the exposure to an increasingly more professional cyber crime community. To get the best cybersecurity standard, […]
Read more
Bang for the buck – calculating the ROI of cybersecurity
October 5, 2020
The cybercrime business – just like any other business – looks at their return on investment. If an attack does not not yield results, more than 60 percent of hackers will move on within 40 hours, since hackers have become corporate in their behavior, balancing costs, risks and effort. You are in competition with […]
Read more
Unprepared and exposed – welcome to the grim present of cybercrime
September 14, 2020
A study from Juniper Research foresees that an enormous amount will come from fines related to breaches of General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) and any other data privacy laws. At the same time, a 70 percent increase in cybercrime is predicted until 2024. A lot of the advanced cyberattacks of […]
Read more
Cybercrime: How our demographics makes us the target
June 24, 2020
Reading this, you are probably in the riskiest region to be online, namely Northern Europe or North America. Protection, such as legal and technical measurements on a country level has some effect – having a low score on Global Cybersecurity Index (GCI) corresponds with less vulnerability – but other factors, like high income, has more […]
Read more
Optimize the Software Development Process using Leavitt’s Diamond
June 18, 2020
Producing top-quality software derive from excellent design. Excellent design depended on people who understand effective technology development as well as the field in which the application will be used. In short, people, process, and technology are a necessary condition of success. The model, originating from the research of Harold Leavitt, focuses on how people […]
Read more
Creating change and business value with technology
June 4, 2020
How do you implement a new technology platform? By installing the software. Any IT-department can do it. How do you successfully implement a new technology platform? Well, that requires a bit more. One way is to consider Harold Leavitt’s Diamond Model and its three* perspectives for creating organizational change. Process; as in the organization of people […]
Read more
Are your clients’ payments, medical records and data secure? [US]
April 9, 2020
Are you compliant, so that the credit card companies and banks continue to allow transactions? Are you ahead of security concerns, or do you struggle to keep up? Two weeks unable to take payments, what would that do to your business? In this time of increasing level of cybercrimes, rules and regulations are a stepping […]
Read more