<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 07:48:52 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@larshilse/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Publications on Cybersecurity by Lars Hilse]]></title><description><![CDATA[Threat Assessment: BitcoinDanger to the United States' National Security and her Economic and Commercial Interests ISBN 978-1-489-52959-6 SHUT UP! And get a profitable Social Media Policy $14.3 million]]></description><link>http://direct.ecency.com/cybercrime/@larshilse/publications-on-cybersecurity-by-lars-hilse</link><guid isPermaLink="true">http://direct.ecency.com/cybercrime/@larshilse/publications-on-cybersecurity-by-lars-hilse</guid><category><![CDATA[cybercrime]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Thu, 06 Feb 2020 07:07:21 GMT</pubDate></item><item><title><![CDATA[Speeches and Panels on Cybersecurity by Lars Hilse]]></title><description><![CDATA[Keynote: Non-Geo Warfare (Space and Cyber): National Security Implications The International Defence Exhibition and Seminar (IDEAS) | Karachi, Pakistan (2018) Expert at the Hearing: The Security of Critical]]></description><link>http://direct.ecency.com/cybersecurity/@larshilse/speeches-and-panels-on-cybersecurity-by-lars-hilse</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@larshilse/speeches-and-panels-on-cybersecurity-by-lars-hilse</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Thu, 06 Feb 2020 01:51:45 GMT</pubDate></item><item><title><![CDATA[Your cloud software solution should have an offline version for business continuity purposes]]></title><description><![CDATA[That an increasing amount of corporations were pressing users, and corporations to move to what is now known as the cloud. Back then the associated services were referred to as software as a service/ S]]></description><link>http://direct.ecency.com/acrac/@larshilse/yourcloudsoftwaresolutionshouldhaveanofflineversionforbusinesscontinuitypurposes-uf4ghjez4a</link><guid isPermaLink="true">http://direct.ecency.com/acrac/@larshilse/yourcloudsoftwaresolutionshouldhaveanofflineversionforbusinesscontinuitypurposes-uf4ghjez4a</guid><category><![CDATA[acrac]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Mon, 28 Oct 2019 08:28:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/yX2kCPo1MLyvdoGgtKeHtfr4MHtkbg8XUfmGYS1uvQYHTqRiFF3eg5KLfb3nWxxLDWjLGshM6PgRnbHqC8M9bBTXrAUQkAJkbeGcdZfSh1zNyaa7foQBEjdVeNaQHnKrLz2jyc6WTzXRb7YyVZUXC8f9GbdzwdRgvLSEN1Skizv9Qr2GRmpPUi4EPQPNN4yfeqqBRJVLevEfyg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lessons learned from the internet: from creation to finish, what what not to implement into autonomous driving and the smart grid]]></title><description><![CDATA[The first thing that comes to my mind when I think of the internet and its advancement is that we should have done a much better job in securing it against… well pretty much anything going amok today.]]></description><link>http://direct.ecency.com/digitalethics/@larshilse/lessonslearnedfromtheinternetfromcreationtofinishwhatwhatnottoimplementintoautonomousdrivingandthesmartgrid-u5w5gxe4u2</link><guid isPermaLink="true">http://direct.ecency.com/digitalethics/@larshilse/lessonslearnedfromtheinternetfromcreationtofinishwhatwhatnottoimplementintoautonomousdrivingandthesmartgrid-u5w5gxe4u2</guid><category><![CDATA[digitalethics]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Fri, 25 Oct 2019 11:27:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/RtfsyWaiw3sP1Hhu9ubXT4nRZqiPRoBSXhZa8rMgQy77aXBSyUTGgwAimXXqeerX9A9TFFgSVAapCkapEUyWeh7z5X6sjHUKhC5BRrzVCVjjqaoMBE3WZi6HFHSxpW4xCRxTvcj3JYifDcvfnYN8TUevoiT1yAcaiwfMVXVotybDtZ2XP4uYo4gzWraE3S3xQ6NFXTZuJ5k7i8Y5pajLfgWgBQH5hiTWWMqkRyvbeuNDcECfmQQLDXifgVaGqc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why a detailed network documentation is essential?]]></title><description><![CDATA[More often than not when I walk into a building I will see RJ-45 network outlets in the wild. Without having done exact calculations I was able to hook up my laptop to this outlet, and have full access]]></description><link>http://direct.ecency.com/acrac/@larshilse/whyadetailednetworkdocumentationisessential-2gwcr7mt4l</link><guid isPermaLink="true">http://direct.ecency.com/acrac/@larshilse/whyadetailednetworkdocumentationisessential-2gwcr7mt4l</guid><category><![CDATA[acrac]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Thu, 24 Oct 2019 08:25:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/3zpz8WQe4SNGrtEu5s4JDaPNv8My5XoCX57sUCLyofiFJavX2QjVPHo9tQ6f8s1QkBBaidLXkc4nKXcLUN9gWjyxR4NPJyeWUR5q1EZEa6M6QAhrspjNiXZYWrvekq7oDZ1gYweHUDbHpJZYFKXt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Printers should be segregated from the rest of the network]]></title><description><![CDATA[When it comes to security risks for networks, hardly anyone will think of a printer as an existential threat to an organization. However, multiple cases proving that printers, and other IOT devices can]]></description><link>http://direct.ecency.com/acrac/@larshilse/printersshouldbesegregatedfromtherestofthenetwork-9gahkx1eyz</link><guid isPermaLink="true">http://direct.ecency.com/acrac/@larshilse/printersshouldbesegregatedfromtherestofthenetwork-9gahkx1eyz</guid><category><![CDATA[acrac]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Wed, 23 Oct 2019 09:22:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/AmRc67RgYaWULcQho3N5XkU7YUiRDbAvMkKPV9RFuy7BC3Rjv2d6zU88nXqa2qtyjoHwUQcr52pim9zGXvrjy8iixdfeq3ZR9p3QzTkoFW7SKazH3onWHKwNSrYnnRSHrnhEYCHjoHKUDTFo1eAfK6YScayyZXc2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why it’s a bad idea to have your device’s IP address publicly visible!]]></title><description><![CDATA[You know how you walk into an office building, and the machines standing around have stickers on them with their IP address clearly visible to the general public? Well, thank you for that! You just saved]]></description><link>http://direct.ecency.com/ipaddress/@larshilse/whyitsabadideatohaveyourdevicesipaddresspubliclyvisible-7xpb2o1cha</link><guid isPermaLink="true">http://direct.ecency.com/ipaddress/@larshilse/whyitsabadideatohaveyourdevicesipaddresspubliclyvisible-7xpb2o1cha</guid><category><![CDATA[ipaddress]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Tue, 22 Oct 2019 08:39:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/YpihifdXP4WR48KaL4FHYE9cdHPYY4w6y1qy6ZYHZGHbdPR8YmkE2Zqtzur5KikLUGEsFt6ezijgD8mXj7LnunaNUREvYPcT94fzJrw3KiQN2VvH5G43sWBHEtfPQuA6gunAXLmh5ehDDQTzwkaqYfpdRtrddRhEaTfeRDp3JxLv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Do encrypted cloud backups have benefits I’m missing?]]></title><description><![CDATA[n fact, they do! Unless you are set in a very dynamic environment, where a lot of changes to files in operational Infrastructure happens You have probably follow the trend, and have a cloud-based back]]></description><link>http://direct.ecency.com/cloudcomputing/@larshilse/doencryptedcloudbackupshavebenefitsimmissing-aue5mlwl9j</link><guid isPermaLink="true">http://direct.ecency.com/cloudcomputing/@larshilse/doencryptedcloudbackupshavebenefitsimmissing-aue5mlwl9j</guid><category><![CDATA[cloudcomputing]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Mon, 21 Oct 2019 12:19:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/21PRtjKRXPQyiXmrEn9unCpagSYkz7QgxE5AZoN9ULHyvpchLGPHB5Jh2wmTdbYjXaYQTBg4znRA8wDtUufDz7o2yxf8F5b8XYYYMdr1VL9nxNCWJk5ihAU2yHrhfQv7MetTT1ifpQyjXJxSGYMEv5c?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The data you store in the cloud must be segregated from that of other clients]]></title><description><![CDATA[One of the most problematic issues that is going to strike us in the near future is the cross infection of systems. Currently there are no sane arguments to support insisting on a totally isolated the]]></description><link>http://direct.ecency.com/cloudstorage/@larshilse/thedatayoustoreinthecloudmustbesegregatedfromthatofotherclients-gnepksn729</link><guid isPermaLink="true">http://direct.ecency.com/cloudstorage/@larshilse/thedatayoustoreinthecloudmustbesegregatedfromthatofotherclients-gnepksn729</guid><category><![CDATA[cloudstorage]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Fri, 18 Oct 2019 08:00:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/8th8uW8KLF3fD9RVZSfm7bHtnp1SzycjGyFm7CjHesWsdxSAS7RJCXjYKDYR3ZTQHMMdX7ostJNoYkjQmwcPbaBcuSvvobk4WQ8GdLovQR7iinVgXxfCznwkixygk8kL2mX5XftyjrZoTreLZT2XoDn7sg7Fcw1bjLyu5GdB68CEFFKu3H8Gzf9rzS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why you should isolate un-patchable, end-of-life software]]></title><description><![CDATA[And another blog post from the recent past I outlined why a patch policy and an update policy maybe critical for survival of an organization. On rare occasions, and actually more often than desirable critical]]></description><link>http://direct.ecency.com/acrac/@larshilse/whyyoushouldisolateun-patchableend-of-lifesoftware-murxgtlu60</link><guid isPermaLink="true">http://direct.ecency.com/acrac/@larshilse/whyyoushouldisolateun-patchableend-of-lifesoftware-murxgtlu60</guid><category><![CDATA[acrac]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Thu, 17 Oct 2019 08:42:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/LcTxR7u1XKacLDgfC3mUg4BBu61ykdv5kBsF5N3navzWweyAKZPzaABMk7sQn9YsMpNXjX9SAVrZcWJMuuVPsagXrhPztYiky17yDb6cDdeG65vcpEUNXSf2mw2o1pmeVK9VJDR3dPGuLeoQ3uwNDpoUS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Physical access to data is restricted?]]></title><description><![CDATA[Justifiably you have the questions poking around in your head about why you should limit physical access to data? The answer is quite simple::: first of all let’s start with a definition of what I actually]]></description><link>http://direct.ecency.com/accesslimitation/@larshilse/physicalaccesstodataisrestricted-znv6e195ms</link><guid isPermaLink="true">http://direct.ecency.com/accesslimitation/@larshilse/physicalaccesstodataisrestricted-znv6e195ms</guid><category><![CDATA[accesslimitation]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Wed, 16 Oct 2019 10:24:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy6zv9zbdSsyTk7LXywCydUwnPFtYjPm6YNorALCdvW5cNst7c7CoKNUVGHrwnwtSS8e3wPLhiwVWyPyK2gYdtsf3uHnpAjRP7xSL4fHFQxqGpTL733YnxUn3Q?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Police Proof local storage/raid proof]]></title><description><![CDATA[If you years ago I was contacted by an internationally operating law firm. They had very special requirements as to their data protection. I never did ask about the emphasis they had towards their clients]]></description><link>http://direct.ecency.com/intelligence/@larshilse/policeprooflocalstorageraidproof-8teptuti2i</link><guid isPermaLink="true">http://direct.ecency.com/intelligence/@larshilse/policeprooflocalstorageraidproof-8teptuti2i</guid><category><![CDATA[intelligence]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Tue, 15 Oct 2019 09:12:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/99pyU5Ga1kwrPdxxeJKYwUovYcZqXopEai6VkQ3oqxdZaix8XH4xynAwaLAmTEfbmk7BcnVY1nBgLoSMbkmUizMcifT23MXKvVuSxR22Rchn4gzMbQbDpF3gaRjj5UhtQN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[EU media’s misinterpretation on espionage and human rights violations in the digital realm]]></title><description><![CDATA[When nation states spy on other nation states that’s  called espionage. When nation states spy on the populace of an entire nation; that is a human rights violation! So when the Snowden revelations were]]></description><link>http://direct.ecency.com/digitalethics/@larshilse/eumediasmisinterpretationonespionageandhumanrightsviolationsinthedigitalrealm-95sva9jryf</link><guid isPermaLink="true">http://direct.ecency.com/digitalethics/@larshilse/eumediasmisinterpretationonespionageandhumanrightsviolationsinthedigitalrealm-95sva9jryf</guid><category><![CDATA[digitalethics]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Mon, 14 Oct 2019 10:35:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/f85of4KXmvsUkgmLyTrRs3ZrsibasqP2LWmUE4e5kqh476yh7EBLc5gnAHtDWA16BSFuahDZ6owFjXMsMARe9Yy1PyjjaEoEf3n17eDzuYytYXTPuN7uD9eG9RTF93V4ceZFaqMT56pKB42bBqfnEA8ChLjAwnoDep2KDLiYSPdXq8es18TyKzpoor5BvYno7o2Vrj7566?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What Active Directory backup do you pursue?]]></title><description><![CDATA[So one of the most hardest things to back up regularly is going to be here active directory. Due to the complex and constantly changing environment this otherwise great piece of software is set in makes]]></description><link>http://direct.ecency.com/acrac/@larshilse/whatactivedirectorybackupdoyoupursue-khpkr0n4z0</link><guid isPermaLink="true">http://direct.ecency.com/acrac/@larshilse/whatactivedirectorybackupdoyoupursue-khpkr0n4z0</guid><category><![CDATA[acrac]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Fri, 11 Oct 2019 10:09:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/JvFFVmatwWHTm4QZBTwGV9PR5xxDss8r1NbMsVLWACX4ixThNsWdrubcr6voNES9aD6byJXCP7tgkmYata9TmQtw3rZh4tP6s5qLf9ovZ25UHcSkbuR1o4Vq8CWgegDFJFEKkEeXb4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Your servers and critical infrastructure elements should be in an unmarked, locked room with access control and access log as well as CCTV]]></title><description><![CDATA[It regularly makes you wonder how many organizations have their servers and other critical infrastructure in rooms marked clearly as the server and communication room. When confronted with a question why]]></description><link>http://direct.ecency.com/cctv/@larshilse/yourserversandcriticalinfrastructureelementsshouldbeinanunmarkedlockedroomwithaccesscontrolandaccesslogaswellascctv-5nx9whn673</link><guid isPermaLink="true">http://direct.ecency.com/cctv/@larshilse/yourserversandcriticalinfrastructureelementsshouldbeinanunmarkedlockedroomwithaccesscontrolandaccesslogaswellascctv-5nx9whn673</guid><category><![CDATA[cctv]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Thu, 10 Oct 2019 11:05:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/7AzetLrHVAgJezhZ2oyqXF8PccJDqHfVPLEcNUtgYCquy6pL9bUGVvT6REoJmhE3Xix6eZsjn1H66SMNsST6x7NEXYgkKmiFwZe99Z8awcxN9nKyVZiZYSZtHj57qm1TmuBUmQ2Wyk5mSXL6CdZjAxytRkKBjy5FSwYJEVkt4aotaCmCGiPithJCw4hEH1RnSxwVdev2R3vDS9ka8HqfMLEVxVnWNczMziw1zNntE45yZdVATyWFGx1ttRAFrr4XpmG6sDXDcp4e?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why you need a patch and update policy, and protocol]]></title><description><![CDATA[But it appears that one of the main reasons for malware, rent somewhere, and other dubious software is able to spread so quick within organizations is due to the fact that systems call police servers are]]></description><link>http://direct.ecency.com/acrac/@larshilse/whyyouneedapatchandupdatepolicyandprotocol-phfvgqj3rs</link><guid isPermaLink="true">http://direct.ecency.com/acrac/@larshilse/whyyouneedapatchandupdatepolicyandprotocol-phfvgqj3rs</guid><category><![CDATA[acrac]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Mon, 27 May 2019 23:46:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stzCcBAdWsiiVZqjyeAeuPCaRVYkhZ7ddWbPomUFhG1zU4ThkRHD4s1mVjj1DM9FLfbDdNvHv3FGXuLQrGfxJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Protecting your organisation from the risk of social engineering]]></title><description><![CDATA[Social engineering describes the process by which an attacker gains access to a facility or system by manipulating someone to grant them access they shouldn’t have in the first place.  When speaking]]></description><link>http://direct.ecency.com/cybercrime/@larshilse/protectingyourorganisationfromtheriskofsocialengineering-jmj1458jlp</link><guid isPermaLink="true">http://direct.ecency.com/cybercrime/@larshilse/protectingyourorganisationfromtheriskofsocialengineering-jmj1458jlp</guid><category><![CDATA[cybercrime]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Mon, 27 May 2019 23:41:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8gT4rdGzWGdfUnMJ8gjPRWxYLyS86doLdeRgqVtj74fh7Z3z2bJvE69ouWmHwrs8wibdKhVtBPcbEDR56TsnfhHt75PeVU8aVHprKEL3U4CiNqJTvNcBL1ud7TpTDRv552owtQsPLCFtAzgPEZ6sDJwX79JWJnqU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Protecting your organisation from CEO fraud]]></title><description><![CDATA[One of the most costly cyber threats/risks is CEO fraud. The attackers impersonate a senior representative of the company by email mostly.  With a shady excuse they will get in touch with a resource]]></description><link>http://direct.ecency.com/ceofraud/@larshilse/protectingyourorganisationfromceofraud-xj2a4c0jb9</link><guid isPermaLink="true">http://direct.ecency.com/ceofraud/@larshilse/protectingyourorganisationfromceofraud-xj2a4c0jb9</guid><category><![CDATA[ceofraud]]></category><dc:creator><![CDATA[larshilse]]></dc:creator><pubDate>Tue, 07 May 2019 16:44:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXBMfurYb44C4ETTxvdKvQJfcYErNAh9wBS36zDA6hCjKrXbQsiHFGZAkZju2M8J7ZX3qm7QPduxghbZgx1rd6V2kTgpc6?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>