I started this mission back in 2015, and now 4 years into it I am now more convinced than ever the mission is worth while and will continue to protect the enterprise far into the future. The most important and fundamental principle of the mission is securing your enterprise by reducing the attack surface. This […]Read More My mission to reduce the Attack Surface.
This years Key Note Speaker, Tony Fergusson knows how important Digital Transformation is to a company. It’s a matter of survival. Tony Fergusson is an Infrastructure architect, working with many technologies within the Enterprise with a focus on the Security. Tony has over 20 years of experience in the IT industry and has been recently focusing […]Read More RANTEK PERFORMANCE DAY 2017, MAY 18, THE BLACK DIAMOND, COPENHAGEN
The number of open listening ports on the internet is around 185 million (https://census.io). This means there is plenty of opportunity to exploit these open services, as it is now possible to scan the entire internet in under 1 hour for a particular port (service) (https://Zmap.io). Can we somehow hide open ports (services) on the […]Read More Black Cloud, how the internet is going dark
The Application Delivery Controller continues to increase market share in the enterprise networking space, but I’m not sure everyone understands the value of this device, and why this network component has become an important part of the enterprise. The most common task of an ADC is load balancing, and not that long ago most of these devices were called load balancers, […]Read More Application Delivery Controllers the Swiss Army Knife
The legacy method of granting users access to applications in the enterprise is to extend the network perimeter to the client. This is achieved by routing the traffic between the client and the network edge in one secure tunnel. This approach poses a security risk as the user usually has full access to all network […]Read More End of an Era for VPN?
The Enterprise IT landscape is changing with the adoption of mobility and cloud services, and enterprises need to change their architecture to meet the growing needs of securing users from anywhere on any device. Join in and be inspired by mobile security session at the Nordic Security Conference in Stockholm. Nordic ITSecurity 2016 Program The […]Read More A World without the Security Perimeter