What is Strategic Product Management and why do we need it in the security industry

“Strategic Product Management” is, first of all, a buzz word. A hype, if you want. But that doesn’t mean that you don’t need it. Most technology companies have a product management department that should act as the “voice of the customer” on one side and translating their finding into requirements on the other side. I won’t go into the debate if this makes sense or not. Read here about Product Manager, Product Marketing Manager and Technical Product Manager. PMs typically generate an extensive roadmap of new products and enhancements which almost always never get implemented. But is product management really being used…

Phishing created for Apple’s mobile devices

I received last night an email pretending to come from Apple’s support. But, it is badly made if you see it in an email client. Dear Customer AppleID14028364ca Due to recent updates we are asking many of our customers to confirm their information this is nothing to worry about. We are making sure we have the correct information on file and that you are the rightful account holder. Failure to comply with this may result in your account being suspended. Once completed you may resume to use your account as normal and we would like to thank you for taking…

No Picture

FritzBox users: protect your network for free!

If you are living in Germany, Austria or Switzerland, there is a high chance that you are using one of the AVM’s FritzBox for your broadband connection. The FritzBox is a very small device which runs a PowerPC processor and between 16 and 32 MB RAM. This is almost nothing! So, you can’t install antivirus or some security solution to filter the URLs you visit via this device. There is, however, a very easy and good way to protect your network. All new models of FritzBox have the possibility to set a special DNS server which can be used for…

No Picture

How much is a blog instance worth?

I wrote in the post  Do you really know who’s visiting your website? about how often hackers probe my websites. IT Security News has of today this: 5,914 blocked malicious login attempts / was 2092 on May 8th 2,182 spam comments blocked by Akismet. / was 2115 on May 8th The login attempts more than doubled in just 5 weeks. Of course, they are all automated attacks, so we can’t really speak of an effort from anyone’s site.   Why ? If a hacker “owns” a website he is able to do a few things:  Change content and possible deliver malware to your readers Host individual “sub-pages”…

No Picture

Every minute invested in planning, saves you 10 in implementation

I have no idea who came with this statistic, but I can confirm that it is true !   The example below doesn’t want to explain how to search for strings nor how to use TDD, but to demonstrate that a bit of planning in advance can really speed things up!   I was in need of a way to search in a pretty complex data structure for a complicated string (letters, numbers, symbols), but not by doing an exact search. Instead I was looking like a search similar to how humans apply a “looks like” algorithm. So, I was trying to…

No Picture

Heise is offering IT Security consulting for free. But should you trust them?

        Heise created a portal for companies to assess their IT security. Details can be found here:  You don’t have to register to take part of the survey which assesses your company’s security. If you want anonymity, check this page. It is important to mention who sponsored the initiative: Sophos, Baramundi, GateProtect, Fortinet, Microsoft, Telekom and others. So, I think we can expect a not-so-independent opinion about your security standpoint. But, hey, it is better than nothing ! However, the first thing you see when you go to the page is this:   Come on Heise… you…

No Picture

October is Cyber Security Awareness Month – Tips to improve your security

October is the Cybersecurity Awareness month. Awareness is the key to help others to not fall for the most scams. Here is a short list with tips to help you not fall prey to the online predators. A lot more like this is available in the free eBook: Improve your Security   ### Never open attachments from an email. Email was not invented for sending files and definitely not programs or archives with programs in them. Also pictures in emails are pretty deceiving because they might mask malicious actions. ### Don’t respond to unsolicited emails. If you receive an automated…

%d bloggers like this:

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.