Tag Archives: Cyber war;

How the West was won or protecting data

The Internet world shook once again this week with the revelation of military, strategic information leaked by a sports app. By running around the compound soldiers gave away their position to the app, that dutifully offered this information to the … Continue reading

Posted in Cyber awareness, Cyber education, Cyber espionage, Cyber security, Cyber warfare, Privacy | Tagged , , , | Leave a comment

Breaking down silos, or cooperation in all things cyber

“We need to break down silos”, is a phrase often heard in national and international meetings around cyber security and enforcing cyber crime. So it is no coincidence that at the upcoming NLIGF (Netherlands Internet Governance Forum), the IGF, but … Continue reading

Posted in Botnets, Cyber crime, Cyber security, Hacking, International cooperation: cross border aspects, Internet governance, Privacy, spam | Tagged , , , , , , , , , , , | Leave a comment

Fear of China and ICT production, part 2

Recently I wrote a blog post on the lessons behind the takedown by Microsoft of 3322.org. BTW, this organisation is back online after striking a deal with Microsoft. (Click here.) In the blog I focussed on the fact that most … Continue reading

Posted in Cyber awareness, Cyber espionage, Cyber security, Cyber warfare, Hacking, Internet governance | Tagged , , , , , | Leave a comment

The Internet and the legitimacy of governments

In two recent debate events I participated in, on iFreedom and privacy in the online world, mistrust of government and government’s intentions and motivations on and towards the Internet were abundantly present with more than just a few people in … Continue reading

Posted in Cyber awareness, Cyber crime, Cyber espionage, Cyber security, Cyber warfare, International cooperation: cross border aspects, Internet governance, Privacy | Tagged , , , , , , , , , , | Leave a comment

Cyber security, BYOD and production in China

On one of my very first trips abroad as international liaison at OPTA I came back on the high-speed train from Paris after contributing for three days at the OECD on the anti-spam tool kit. Next to me was a … Continue reading

Posted in Botnets, Cyber awareness, Cyber crime, Cyber education, Cyber espionage, Cyber security, Mobile, Privacy | Tagged , , , , , , , , | Leave a comment

Coordination and cooperation in online threats

In his recent blog post Jan Jaap Oerlemans of Leiden University’s Law school reacted in-depth on the recent cyber security analyses of the Dutch National Cyber Security Centre and the accompanying letter of minister I. Opstelten of Security and Justice. … Continue reading

Posted in Cyber awareness, Cyber crime, Cyber espionage, Cyber security, Cyber warfare, Malware enforcement, Spam enforcement | Tagged , , , , , , , , , , , , | Leave a comment

Cyber security and old(er) men

Recently at a meeting on cyber security I looked around and took a close look at who were sitting around me. Mostly middle aged men and older (including myself), hardly any ladies nor youth. Discussing this afterwards with perhaps the … Continue reading

Posted in Cyber awareness, Cyber crime, Cyber education, Cyber security, Cyber warfare, International cooperation: cross border aspects, Internet governance, Mobile | Tagged , , , , , , , , , , , | Leave a comment