Visitor management – it is all about people, really

Entrant Checkin Page

It is all about people, really!People, processes and systemsPhysical security is an important component for most companies. Usually some kind of perimeter security is used to prevent unauthorised persons to gain access to sensitive information, information that the company wants to protect. The core principles in a sound security strategy is to know what information […]

Continue reading

1 PCI DSS Cake (89904 hrs later)!

PCI Cake

The PCI Guy – that sums me pretty much up for the past years acting as a PCI DSS Compliance Officer at Crosskey Banking Solutions Today Crosskey got the AOC signed (yet again) and there is a feeling of pride (and relief) to reach the goal year after year. It never gets boring. A lot of hard work lies behind […]

Continue reading

11 Master Asynchronous JavaScript in a few simple steps

Asynchronous JavaScript

Introduction One of the powerful features of JavaScript is its asynchronous nature. And it is also one of the most difficult to master. But asynchronous JavaScript does not have to be hard. When programming for the web a lot of functions have to behave asynchronous. If not, our programs would frequently get blocked waiting for […]

Continue reading

Are you DROWNing?

Today a new SSL attack was released named DROWN Attack. DROWN stands for Decrypting RSA with Obsolete and Weakened eNcryption. You can read all the nasty details here DROWN Attack (CVE-2016-0800) To protect against DROWN, sysadmins need to disable the user of the obsolete and unsecure protocol SSLv2 on web servers, mail servers and any software that uses and supports SSL/TLS. […]

Continue reading

I Encrypt, therefore I Am

In this age of global surveillance and spying, encrypting communications has become the standard. Companies, big and small, are finally taking the necessary steps to encrypt all their traffic traversing the Internet in order to protect their users from the ubiquitous tentacles of the intelligence agencies of the world. Even Google started ranking SSL/TLS protected […]

Continue reading

Auditing Automation

The use of automation has fundamentally changed the IT landscape and made us more efficient in managing our increasingly complex environments. In this post I will explore the benefits and risks with increasing automation and how these risks can be mitigated  with proper auditing, risk management and planning. Automation comes with a price: We as […]

Continue reading