authenticon.nl
Security is all about overview and insight | Authenticon
http://www.authenticon.nl/content/security-all-about-overview-and-insight
Skip to main content area. Security is all about overview and insight. Security is all about overview and insight. The steering information produced by the application scanning effort must be enriched on various levels. Embedding frequent scanning into the software development life cycle enables the production of highly secure applications. Integration with the results of perimeter and traffic monitoring supports a comprehensive overall security view. Translating identified vulnerabilites int...DigiD tij...
authenticon.nl
Persverklaring cyberaanvallen | Authenticon
http://www.authenticon.nl/content/persverklaring-cyberaanvallen
Skip to main content area. 6 april 2013 17:43. De afgelopen dagen zijn er meerdere aanvallen op websites van banken geweest. Er is geen sprake geweest van een inbraak in de systemen. DigiD tijdelijk niet toegankelijk door DDOS-aanval. Aantal slachtoffers ID-fraude gestegen, schade gedaald. DigiD tijdelijk niet toegankelijk door DDOS-aanval 24. Persverklaring cyberaanvallen 6 april 2013 17:43 De. DigiD tijdelijk niet toegankelijk. 31 883 444 333. We prefer jitsi instead of skype.
authenticon.nl
Maturity in controlled steps | Authenticon
http://www.authenticon.nl/content/maturity-controlled-steps
Skip to main content area. Maturity in controlled steps. Maturity in controlled steps. In order to objectify progress and stimulate participants we have translated the SAMM model into an easy-to-use quick scan tool. The tool provides a questionnaire with a comprehensive set of questions that should be distributed amongst all relevant stakeholders. Their answers provide a useful and objective guideline for the improvement effort. Climbing from plateau to plateau normally requires numerous steps executed i...
authenticon.nl
Solution Architecture | Authenticon
http://www.authenticon.nl/content/solution-architecture
Skip to main content area. In order to take our ambition to the market the following Solution Architecture has been designed. Solution components are provided in collaboration with business partners who develop these tools. In order to provide transparency across underlying tools and offer additional functionality where needed, we introduced our so called Adaptation Layer. Elements of this adaptation layer are being developed in close interaction with our customers. DigiD tijdelijk niet toegankelijk.
authenticon.nl
Beacon in troubled cyber waters | Authenticon
http://www.authenticon.nl/content/beacon-troubled-cyber-waters
Skip to main content area. Beacon in troubled cyber waters. Beacon in troubled cyber waters. A lighthouse allowes passing ships to monitor their progress against a plotted course and a verified original position. Taking into account the wind and currents a ship is able to safely manouver risks and obstacles and achieve it's final destination. In the domain of application security we provide two key functions: we scan for known vulnerabilities and we perform threat modelling. How vulnerable am I? Threat m...
authenticon.nl
Everybody's Business | Authenticon
http://www.authenticon.nl/content/everybodys-business
Skip to main content area. The penetration of applications in our lives is complete. Practically everybody uses mobile communication with one or more devices. As the day evolves so does the usage of our favorite devices. Provided functionalities are available in every room of every house or building or even pulic space. This way application security has become everybody's business. Maturity in controlled steps. Security = freedom * confidence. Aantal slachtoffers ID-fraude gestegen, schade gedaald.
authenticon.nl
Beacon in troubled cyber waters | Authenticon
http://www.authenticon.nl/node/52
Skip to main content area. Beacon in troubled cyber waters. Beacon in troubled cyber waters. A lighthouse allowes passing ships to monitor their progress against a plotted course and a verified original position. Taking into account the wind and currents a ship is able to safely manouver risks and obstacles and achieve it's final destination. In the domain of application security we provide two key functions: we scan for known vulnerabilities and we perform threat modelling. How vulnerable am I? Threat m...
authenticon.nl
Articles | Authenticon
http://www.authenticon.nl/recent-articles
Skip to main content area. Undefined variable: node top in. Home/authen01/domains/authenticon.nl/public html/sites/all/themes/converge/node.tpl.php. Undefined variable: node bottom in. Home/authen01/domains/authenticon.nl/public html/sites/all/themes/converge/node.tpl.php. Undefined variable: node top in. Home/authen01/domains/authenticon.nl/public html/sites/all/themes/converge/node.tpl.php. Undefined variable: node bottom in. Undefined variable: node top in. Undefined variable: node bottom in. De afgel...
authenticon.nl
Domain Model | Authenticon
http://www.authenticon.nl/content/domain-model
Skip to main content area. Software Security Domain Model. The industry's two most recognized reference models for security maturity are SAMM and Common Criteria. Using Common Criteria as a reference model we created a domain model for application security. Aantal slachtoffers ID-fraude gestegen, schade gedaald. DigiD tijdelijk niet toegankelijk door DDOS-aanval 24. Persverklaring cyberaanvallen 6 april 2013 17:43 De. DigiD tijdelijk niet toegankelijk. 31 883 444 333. We prefer jitsi instead of skype.