Blog Posts Tagged with "Netherlands"

C4363f41d25c216c53c8d71a1ac44a90

Mandatory Privacy Impact Assessments for Dutch Government IT Projects

October 24, 2013 Added by:Matthijs R. Koot

As of September 1st 2013 in the Netherlands, a new rule applies to ICT proposals initiated by the national-level government entities (Ministries, etc.): ICT project proposals must now include a Privacy Impact Assessment (PIA).

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

On Dutch Banking Woes and DDoS Attacks

April 25, 2013 Added by:Don Eijndhoven

If you don't live in the Netherlands or don't happen to have a Dutch bank account, you can certainly be forgiven for not having caught wind of the major banking woes that have been plaguing the Dutch.

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

The Dutch, the Yanks, the Cloud and YOU

December 13, 2012 Added by:Don Eijndhoven

Recently a research project by the Amsterdam University [PDF Alert] revealed that US law allows for the US government to access information stored in the Cloud, by (ab)using the PATRIOT act...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Dutch Govt Expresses Intent To Draft New Cybercrime Legislation

October 17, 2012 Added by:Matthijs R. Koot

On October 15th 2012, the Dutch Minister of Security & Justice (Ivo Opstelten) sent this letter to the Dutch parliament expressing intentions to draft new cybercrime legislation in the Netherlands. Here is my Dutch-to-English translation of the entire letter...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

The Dutch and the Dorifel

August 27, 2012 Added by:Don Eijndhoven

XDocCrypt/Dorifel is a new trojan that encrypts executables, Excel- and Word files that it finds on USB drives and network disks, causing companies to come to a grinding halt after infection. What worries me most is it’s being delivered by systems previously infected with the Citadel/Zeus trojan...

Comments  (1)

C4363f41d25c216c53c8d71a1ac44a90

English Translation of the Dutch Defense Cyber Strategy

July 18, 2012 Added by:Matthijs R. Koot

The biggest threat in the digital domain is due to high-end and complex digital offensive capabilities that are targeted at a specific targets that can severely limit the the armed forces' ability to act. A lack of insight into digital possibilities to carry out attacks is a real risk to the armed forces...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Netherlands to Establish Mandatory Breach Notification

July 11, 2012 Added by:Matthijs R. Koot

In 2012, Netherlands will establish mandatory breach notification for vital sectors, giving the government increasing sectoral intervention possibilities. This includes the authority to obtain information, administrative enforcement of designations and the authority to appoint an officer on behalf of the government...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch MoD Releases Defense Cyber Strategy

June 29, 2012 Added by:Don Eijndhoven

What makes this interesting is that they are declaring that non-combatants may also be actively targeted. In essence, they are putting the world on notice that if you’re involved with a cyber attack, part of a militia or a terrorist, you have a bull’s-eye on your head. No matter where you are. Plain and simple...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

The Netherlands Passes Net Neutrality Legislation

May 24, 2012 Added by:Electronic Frontier Foundation

The Netherlands is the first country in Europe to establish a legal framework supporting net neutrality. The law contains language that restricts when ISPs can wiretap users, and limits the circumstances under which ISPs can cut off a subscriber's Internet access altogether...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Notes on Electromagnetic Pulse (EMP) in US, UK, NL

May 22, 2012 Added by:Matthijs R. Koot

In 2009, there was a discussion on a forum for pilots about an article that argued that a commercial aircraft could be brought down by DIY EMP bombs. Also in 2009, the U.S. Patent Application for an Electromagnetic pulse (EMP) hardened information infrastructure was filed...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch Military Intelligence Dives into Cyber

May 21, 2012 Added by:Don Eijndhoven

One of the most interesting facts extracted from the report is that the MIVD will focus the majority of its cyber warfare efforts in countering espionage. Given that this is probably the most tangible and widely represented cyber activity currently employed, this is a wise choice...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Dutch MoD Innovation Competition 2012: CYBER Operations 2.0

May 16, 2012 Added by:Matthijs R. Koot

The Dutch Ministry of Defense's (MoD) annually issues a "Defense Innovation Competition" is a competition that is intended to get input from and foster relations with Dutch industry and SME. This year's theme is "CYBER Operations 2.0"...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch Intelligence Rings the Chinese Warning Bell

April 20, 2012 Added by:Don Eijndhoven

Finally the Dutch intelligence service AIVD has started warning the people about Chinese cyber espionage practices against Dutch firms. The Chinese government is actively recruiting Chinese researchers and technical experts to work for them in foreign countries...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Dutch Response to AIV/CAVV Advice on Digital Warfare

April 09, 2012 Added by:Matthijs R. Koot

The digital domain is a new operational domain for the armed forces. The Ministry of Defense is investing to significantly strengthen existing capabilities and develop new ones including offensive. The right to self-defense also applies to cyber attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US and Netherlands Expand Cybersecurity Coordination

February 22, 2012 Added by:Headlines

The Letter of Intent recognizes expanded coordination between the US and the Netherlands, and outlines several areas to further collaborate on cybersecurity including incident management and response activities, control systems security, and cybersecurity exercises...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

KPN Hack: Why was Customer Notification Delayed?

February 13, 2012 Added by:Pierluigi Paganini

The login credentials were stored in plain text in the repository that had been exposed, and that is absurd. This is a failure of the basic security procedures that should be recognized internationally, and is an offense for which there should be heavy penalties...

Comments  (0)

Page « < 1 - 2 - 3 > »
Most Liked