Profile cover photo
Profile photo
Joram Teusink
251 followers -
Daily using my #unconventional, #creative and #sharpwitted bio-processor to create a more secure future | Working @wehkamp, posts are my own
Daily using my #unconventional, #creative and #sharpwitted bio-processor to create a more secure future | Working @wehkamp, posts are my own

251 followers
About
Posts

Post is pinned.Post has attachment
My take on #security awareness, and the #cyber security future with #AI & #MachineLearning in an interview: https://www.youtube.com/watch?v=NzEb4bjH5gI
Add a comment...

Post has attachment
Add a comment...

Post has attachment
So, here it is. Yet another blog post about a yet another case of cryware. I think I'll stop with calling it cryptoware or malware, it's just cryware. Not crying for the damages it causes, but how many of the damages could have prevented with just a mantra of some security hygiene.

Both WannaCry and Petya (or NotPetya) travels from node to node with an incredible pace. Truth to be told, I am in awe of the sophistication of the toolset, while in shock about the amount of steps in the attack-chain used by easily avoidable weaknesses.
Add a comment...

Post has attachment
In my daily work I talk with allot of people. Some of them are (C-level) managers, some of them are Business Owners, and some are Product Owners. But I talk even more to people who actually create, maintain or break the product they are responsible for. And these are the Developers, Engineers and Analysts.

And oh boy, how different do they approach the very same subject! Let me explain what I have learned from that and how I put that knowledge to work in regard to (increasing) Security Awareness.
Add a comment...

Post has attachment
In the soon-to-be world in which everything is connected to everything, we will face quite some (unforeseen) challenges. One of those challenges is related to the protection of privacy and security of the system as a whole. The other one is the role of the consumer. To quickly sum it up in a single statement:

In the world Internet-of-Things, the consumer is not (only) a customer but (also) a supplier.
Add a comment...

Post has attachment
Add a comment...

Post has attachment
#Cyber, just as old as ancient human history! http://www.teusink.eu/2016/09/cyber-just-as-old-as-ancient-human.html #security

Recently I visited a seminar on which the question was asked about what was new on the phenomenon cyber. Although I somehow find we still should #ditchcyber, I started thinking about that question. After some internal computing time I came to the conclusion that cyber is nothing new and that is just as old as ancient human history. Well, that is, the paradigm in which cyber resides is ancient.
Add a comment...

Post has attachment
"Yeah, let's create a page and put all information there that our users and/or customers need to stay secure!” Sounds familiar? Do you have a so called awareness page somewhere on your intranet or website? But are you suffering from lack of traffic, or at least, a lack of success of that page?

How to make Security and Privacy Awareness ubiquitous?
Add a comment...

Post has attachment

Post has attachment
Wait while more posts are being loaded