His Profiles

mail

twitter

Recent Articles by Him

Cybersecurity

Cybersecurity - Quo Vadis?

Rapid Risk Assessment

Rapid Risk Assessment - Analysis of Active Directory Services

Secure Processing with SGX

Secure Processing with SGX - Tackling Risks in the Cloud

High-Secure Portable Storage - Part 2

High-Secure Portable Storage - Part 2: InterLock on Armory

High-Secure Portable Storage

High-Secure Portable Storage - Part 1

Securing Outdated or Unsupported Systems

Securing Outdated or Unsupported Systems

Data Centric Security using DRM infrastructure

Data Centric Security using DRM infrastructure

Securing out-of-band Remote Support (Part 2 of 2)

Securing out-of-band Remote Support (Part 2 of 2)

Securing out-of-band Remote Support (Part 1 of 2)

Securing out-of-band Remote Support (Part 1 of 2)

Securing Your Home Fences

Securing Your Home Fences

Data Fence

Data Fence - A Nice and Small MacOS X Security Audit Tool

Collecting Windows Logs with NXlog

Collecting Windows Logs with NXlog

You want more?

Do you have any questions?

Our experts will get in contact with you!