Blog Security

ICT Institute speaking in De Balie on security Intelligence referendum

On 26 February, ICT Institute presented at a discussion evening in De Balie. De Balie is a well-known platform and center for freedom of speech, contemporary art, politics, culture, cinema and media, situated near the Leidseplein in Amsterdam. ICT Institute co-founder Floris van den Broek spoke about the technical aspects of obtaining personal information for…

Floris van den Broek

What are the Spectre and Meltdown threats?

Security researchers have recently uncovered security issues known as Meltdown and Spectre. These issues apply to all modern processors and allow attackers to gain read access to parts of memory that were meant to be secret. To initiate a Spectre- or Meltdown-based attack, the attacker must be able to run code on the victim’s processor. What are Spectre and…

Floris van den Broek

Next ISO 27001 Training planned for April 16-19, 2018

Due to the success of the recent training Lead Auditor training  ISO 27001, we will organise another session in April 2018. The training is not only for auditors, but for anyone who will be involved in ISO 27001 and students in this course have rated it top for both auditors, IT department members end users and…

Floris van den Broek

The new OWASP top 10 of security vulnerabilities

The Open Web Application Security Project is a very successful free initiative to make Internet Applications more secure. The best known OWASP  project is the OWASP top 10, a list of the most common application security vulnerabilities. This top 10 is updated every four years, and the latest 2017 op 10 was published on November 20th.

Sieuwert van Otterloo

Code analysis prevents hidden security risks

Ensuring security in software means starting at the source code: Developers must build security in from the start. Organisations too often focus on repairing damage post-breach and fixing bugs after launch. Greater attention to security in the earlier stages of software development is needed. It would greatly reduce the percentage of successful attacks, and minimize damage when malicious hackers do…

Stephen Morrow