- About us
- Code of Conduct
- Google SoC
- Recent posts
- Security Workshops
Kai Roer is focusing on user awareness, security culture and the study of how our human mind makes us vulnerable and exploitable. He consults with people and organizations on the interpersonal skills that are vital to a successful and trusted secure environment. He is the creator of the Security Culture Framework, a columnist at Help-Net Security and the author of a number of books about cybersecurity and leadership. Read more »
Lance Spitzner, founder of the Honeynet Project, is an internationally recognized leader in the field of cyber threat research and security training and awareness. Read more »
This year, the annual Honeynet Project Workshop 2015 event will be sponsored by Deutsche Telekom. In anticipation of the event, we did an exclusive interview with André Vorbach (IT-Security Expert) and Markus Schmall (Vice President IT Security) to find out how Deutsche Telekom is getting involved and what they see as the hot topics at this year’s workshop.
Read more »
After a tense few days of waiting, which is always the most stressful part of GSoC for mentoring organizations and org admins, 19:00 UTC today was the moment of truth when some lucky orgs found out that they were accepted for GSoC 2015, and other orgs sadly discovered that they would not be taking part. Read more »
In the first part of this two part blog post, the issue of anticipating retaliation during an aggressive battle to wrest control of a DDoS botnet was examined. In this part, the issues of dual standards, taking responsibility, and learning lessons to make positive change over time are examined.
Read full post here...
With winter in the northern hemisphere beginning to turn into spring, it is once again time to think about summer. And of course, for many open source organizations, that means Google Summer of Code (GSoC).
Read more »
This blog post is the first of a two-part series in response to the Wired article of Oct 14, 2014, "How Microsoft Appointed Itself Sheriff of the Internet." [McM14] I find some problems with this article that raise questions about the depth of research into some elements of the story, and an appearance of bias in how "unintended consequences" are presented.
[McM14] Robert McMillan. How Microsoft Appointed Itself Sheriff of the Internet. http://www.wired.com/2014/10/microsoft-pinkerton/, October 2014.
A few months ago I read the paper "Technical analysis of client identification mechanisms" . The paper is really interesting and it is really worth investing your time and reading. Just a brief excerpt from the abstract: Read more »
Thug 0.6 was released just a few hours ago. The most important change introduced during the 0.5 branch was a complete redesign of the logging infrastructure which is now completely modular. This makes adding (or removing) new logging modules extremely easy. Read more »