Security Risk Management for Critical Infrastructures

Two colleagues and I presented paper titled “Security Risk Management for Critical Infrastructures” at itAIS 2011 Conference, “Information Systems: a crossroads for organization, management, accounting and engineering”, held in Rome, Italy, October 7 – 8, 2011. Abstract: This paper presents … Continued

Location Based Services – Security and Privacy Aspects

On September 28th, I delivered presentation on topic “Location Based Services – Security and Privacy Aspects” on global group Telenor Security Conference 2011. Abstract: Location based services are fast growing area in various types of businesses, particularly concerning mobile operators … Continued

Citation at Fourth Balkan Conference in Informatics

One statement from our earlier book, which has been published 2007, was cited at IEEE Conference Journal. It is interesting and actual for many organizations at moment: “Security is a process of keeping necessary level of risk in acceptable boundaries. That means security is a continual process and not a final state. Organization or institution can’t consider itself “secured” after last security check. That process needs to be continual.”
DOI link: http://doi.ieeecomputersociety.org/10.1109/BCI.2009.20.

Citation and Quotes

I was cited and quoted couple of times in IEEE Computer Magazine article “Fighting Intrusions into Wireless Networks”, Springer Link Book “Novel Algorithms and Techniques in Telecommunications and Networking” and Telektronikk Journal.

IPS, Whom to believe: Gartner or NSS Labs?

An independent test and evaluation of 15 different network intrusion-protection system products from seven vendors showed none were fully effective in warding off attacks against Microsoft, Adobe and other programs. NSS Labs, which conducted the test without vendor sponsorship of any kind, also evaluated the 15 network IPS offerings for their capability in responding to “evasions,” attacks delivered in an obfuscated and stealthy manner in order to hide. In that arena, Juniper Networks and TippingPoint didn’t perform particularly well. Juniper IPS scored lowest at only 17% effectiveness. In that arena, the McAfee and IBM IPS held up particularly well.

Wireless Intrusion Detection and Prevention Systems

After quite some time of silence regarding my work on Wireless Intrusion Detection and Prevention Systems (WIDS / WIPS), I’m considering continuing that work. In past I have done research, published couple of papers on this topic at conferences and journals and also created concept, basic architecture and design of system and products. This possible “reactivating” of work is particularly pushed by recent interest of companies, organizations and institutions including commercial, government etc, and requirements of many production environments.

This is just brief description. If you are interested in more details or want to consider contribution or investment into this development send me e-mail.

1 2 3 4