I’m back from the Security Bloggers Meetup. It was a greatly organized by Dale Paerson. Beer, food and a thirty bloggers coming from several countries. All ingredients for a cool event. I was (finally) able to meet Twitter followers like Tomasz or Mirko. Thanks Dale! Some pictures are available here.
RSA Conference Europe Day 1
The first day of RSA Conference Europe is already over! Arrived this morning (up at 4am to catch my train!), the first impression was very positive. This is the first time I attend this conference and it looks very professional. Honestly, I’m also happy to see that the mix between
Coming Weeks will be Busy
The two coming weeks will be very “intensive”! Between 20 and 22 of October, I’ll attend RSA Europe 2009 in London. Besides the conference, there will be the Security Bloggers Meetup Tuesday evening. And the next week (28-30 October), go to Luxembourg for hack.lu! I still need to read carefully
Keep an Eye on Dormant Virtual Machines
Virtualization is a hot topic for a few years. All organizations, from the smallest to the largest, benefit of virtualization. Easy deployment of new servers, test lab, relocation (DRP & BCP), optimization of resources and much more. And what about security? How to integrate your virtual servers into your security
Complete Misunderstanding of Social Networks
It seems that a buzz is starting on Twitter in Belgium today! Koen Delvaux, a Belgian blogger, posted a story on his blog about his misadventure with a Belgium jeweler (no name here but Twitter is your best friend to find the name and location of the shop). To resume
QOTD: “HTTP Became the New TCP”
I heard the following quote today in a online video about a commercial product and I found it so true: “HTTP became the new TCP!” TCP, or “Transmission Control Protocol“, runs at the transport layer (4th) of the OSI model. HTTP runs on an upper one, the application layer. Historically,
When Security is Threatened by Budget
For a few days, the Belgian ministers started to work hardly on the issue of the 2010 budget. Like everywhere, money is missing. They try to find (good) solutions to present a positive budget and, let’s dream, get some extra revenues. The classic ways to grab more money from the
Security Code Fail
Picture taken this afternoon… No comment!
Information about Microsoft Projects Leaked
What a coincidence! Yesterday I posted an article about protecting your brand in the web 2.0 jungle and today a nice story was reported on Slashdot. A very nice example of bad communication on the web 2.0. Robert Morgan, a Microsoft Research employee, wrote on his LinkedIn profile: “Working in
Cyber-Guerilla
Wednesday, the first French Belgian TV channel broadcasted a documentary called “Cyber Guerilla” realized by Jean-Martial Lefranc. The same documentary was broadcasted on a French channel (TV5) beginning of 2009. I’m often suspicious about documentary proposed by generic channels which tend to represent Internet as a jungle full of bad-guys