Quantcast
Channel: Argent Consulting B.V.
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Using the Cyber Kill Chain to Map Cyber Defenses with Practical Reality

In an effort to better understand the structure and approach of “APT Attacks”, which was at the time virtually a euphemism for cyber-attacks coming from China, researchers investigated hundreds of...

View Article



GCCS 2015: Battlefield for the Internet’s Multi-Stakeholder Coup (Part I)

Published on Norse Corp on Jan 21st, 2015 As you may already be aware, the next iteration of the Global Conference on CyberSpace will be held on April 16th and 17th in The Hague, the Netherlands this...

View Article

GCCS2015 Part II: Government Influence is the Key Issue

(As published on Norse: Feb 5th, 2015) As we noted in Part I: GCCS2015: Battlefield for the Internets’ Multi-stakeholder Coup, the next iteration of the Global Conference on CyberSpace (GCCS2015) will...

View Article

Data Mining Protection: Taking A Privacy Roadtrip with IRMA

If you have ever clicked “I Agree” on Facebook or an Apple device without really going through it, it might be worth your while to go back and read up. Do you know where your data is going? A few...

View Article

Enterprise Security vs. Nation State Threat Actors

The recently published Snowden/NSA/GCHQ slides regarding the Gemalto hack have caused quite a stir amongst security practitioners, board members and politicians alike. But the uproar is minor when...

View Article


The Problem with the Universal Right to Online Privacy

(As published on Norse on April 15, 2015) A landmark decision by the UN Human Rights Council was made on March 26th to cover privacy issues arising from the pervasive monitoring by the UK and the US,...

View Article

The Right to Strike Back

As published on Norse on June 26, 2015. Last week, at the HiP Conference in Paris, there was a debate on whether or not it should be allowed to strike back when you are being hacked. Currently,...

View Article

Missing in Action: Cyber Dictionary?

As published on Norse on September 22nd, 2015. I recently stumbled over an old issue that has shown no signs of being resolved: the lack of a normalized lexicon on Cyber Security. We can’t seem to...

View Article


Cyber Cease-Fire: US v. China

As published on Norse on October 6th, 2015 Interesting times indeed, now that the outcome of Chinese president Xi Jinping’s two-day visit to the White House last week has been made public. According...

View Article


Share without Care – Problematic intelligence sharing arrangements

“Share without Care – Problematic intelligence sharing arrangements”  Written by Group 1 (s2433494, s1543091, s1696939, s2351048, s2401541) for the Faculty of Governance and Global Affairs (FGGA) at...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images