A businessman playing chess

Vulnerability Categories for Business

There are endless ways to divide vulnerabilities into different classifications. Each more granular than the other. However, there is also a need to for a simple divide, targeted to the business. That is the problem this post will solve. By using the same categories as in the post Security for Any Development Team I will break down security vulnerabilities into three categories. After reading this post, you will get an insight into why vulnerabilities may arise, and what can be done to minimise the risk....

November 5, 2022 · 5 min · Oskar Edbro

The Modern Con - Social Networks and Marketing

In todays internet based world, phishing has become a great nuisance. We all know about the emails trying to trick the receiver to perform an action that is to the senders gain. This could be to install malware, send money, or something else. Either way, this is just the newest variant of the con (aka confidence game) to trick someone for gains. After reading The Confidence Game by Maria Konnikova I got to thinking....

August 3, 2022 · 3 min · Oskar Edbro

An Overview of Security Champions

Security Champions is a concept that gets more and more attraction. The function might go under another name, such as Security Masters, but the concepts are the same. In this post I will dig into what this role contains and how it can be applied to improve the security posture of an organisation. My experience with Security Champions is in Research and Development organisations, so my views are anchored in RnD....

June 19, 2022 · 5 min · Oskar Edbro

Privacy not Included

I’ve previously written about the difficulties of keeping up to date with the current privacy policies of products one is using. Not only are they updated regularly, they are also long and complex. Here Mozilla, the non profit organisation behind Firefox among other things, have created Privacy not Included to help. Privacy not included is a tool where experts investigates the privacy of different products, and gives clear information both what is said in the policy and what data it collects (permissions, sensors on the device etc....

May 26, 2022 · 2 min · Oskar Edbro

Basic Network Security for Small Businesses

In today’s connected world every little store or office needs internet, and the usual way to implement that is by setting up a WiFi. There are endless products that allow for a plug and play experience for the less tech-savvy users. However, there are some common traps that someone inexperienced might fall into when setting up a network. In this post I will discuss some of these traps and what risk they might impose....

May 22, 2022 · 3 min · Oskar Edbro