By beginning of October 2017 I started Security Predictions experimental web site. It has been built to harness the ‘wisdom of crowds’. I experiment how we can use crowd-sourced security intelligence to predict future events. Feel free to contribute with your … Continued
This is “Dragan on Security” blog. It has been moved from http://conwex.info/blog/ to this domain. It is not too active at present time as it was earlier, but stay tuned.
The National Institute of Standards and Technology (NIST) announced on October 2, 2012 the selection of KECCAK as the winner of the SHA-3 Cryptographic Hash Algorithm Competition and the new SHA-3 hash algorithm. Keccak makes use of the sponge construction … Continued
There are three possible approaches to information security: reactive, proactive, and predictive. Reactive Information Security – Post incident detection, analysis, notification, containment, eradication, and remediation. Proactive Information Security – Avoiding or opposing threats against computers and networks through understanding the … Continued
During period April – October 2011, I have gone through trainings, passed the exams and obtained new certificates: Certified ISMS Lead Auditor – ISO / IEC 27001 Information Security Management System PCI ISA (Payment Card Industry Internal Security Assessor), PCI … Continued
Two colleagues and I presented paper titled “Security Risk Management for Critical Infrastructures” at itAIS 2011 Conference, “Information Systems: a crossroads for organization, management, accounting and engineering”, held in Rome, Italy, October 7 – 8, 2011. Abstract: This paper presents … Continued
On September 28th, I delivered presentation on topic “Location Based Services – Security and Privacy Aspects” on global group Telenor Security Conference 2011. Abstract: Location based services are fast growing area in various types of businesses, particularly concerning mobile operators … Continued
Welcome to new age of my blog “Dragan on Security”. After more than seven years of blogging on previous platform (since August 28, 2005), I decided to move and to switch to new look and structure of blog. I have … Continued
I invite you to answer poll question “Do you store your credit card PIN into mobile phone?”
I invite you to answer poll question “Have you used penetration testing services” on my blog and see how others voted.