Simple tips to improve your online security
This week I tweeted a bit of security advice which was received well. So i decided to bundle it in a short blog. I also added links to blogs that help you to
Blogger | #Infosec | #AppSec | Security awareness | Occasional Public Speaker | Cycling | Running | Enjoying life
This week I tweeted a bit of security advice which was received well. So i decided to bundle it in a short blog. I also added links to blogs that help you to
Two layers of defense are better than one layer of defense. This seems logic. But every now and then I end up in a discussion - mainly on Twitter - where people tell
I've sent my first newsletter yesterday. It's a newsletter in which I capture the security news that caught my attention in the past week. It can be really anything security related that interests
Review of my Information Security adventures of 2019 and a preview of 2020. Happy New Year!
Today marks 3 years since I wrote my first blog. When I hit the publish button this will be my one hundredth blog post. It's mainly the last one and a half year
If you're a security practitioner I guess this title grabbed your attention immediately. Because we all know that password reuse is a bad security practice and people shouldn't reuse passwords, right? Damn right!
A website is a company’s online business card. It’s a bad sight when it’s poorly designed and developed and users consequentially encounter a lot of difficulties using it. Luckily a
It's been a week since I wrote my last blog. I needed a bit of a break after 31 consecutive days of blogging. In this blog I'll look back on my "adventure". How
This is the 31st and last post in my Cyber Security Awareness Month blog series. I will do a short recap of what I covered in this series, but I also want to
Most people have a lot of internet connected devices at home. Obviously computers, laptops, tablets and smartphones, but it doesn't stop there. TVs, dishwashers, kettles, wearables, toys and even toilets all have smart,
Out of date or not regularly updated operating systems and applications put you at risk because they have a lot of vulnerabilities. Many of these vulnerabilities can be easily detected and exploited by
In previous posts in this series I covered how to create strong passwords, how to enable multi-factor authentication, and how to do this in such a way that you don't lock yourself out