Our abstract entitled: ‘’Get ahead Coming Disruptions in Cyber Security by Working Collaboratively’’ has been selected as a contribution to the 17th European Conference on Cyber Warfare and Security (ECCWS) 2018.
We are looking forward to demonstrating our thinking regarding Collaborative Security and PassSpace by showing ONLINE how multiple instances together authenticate access to sensitive data using different platforms and different tools.
Come and see us in Oslo: http://www.academic-conferences.org/conferences/eccws/
Together with over 900 participants we attended the Sweden game conference in Skövde between October 18-20.
We got insight to the game developing business and which problems it faces.
In the expo area we experienced the newest gaming technology and ideas. The variety of the games to test was wide, from mystery games to VR-games.
The games were great, and it didn’t matter if they were developed by veterans in the business or by new comers.
Even if game development and IT security don’t deal with the same topic we can learn from this business how a good user interface can look like.
During our stay in Washington and Pittsburgh from 11 to November 21 we have collected many valuable information and impressions.
About 11 companies of the German cybertechnology and security industry took part in the business trip to Washington and Pittsburgh to meet potential partners.
The start was a one-day symposium. During the next days, we have met many companies and could make many contacts.
We could present our app to the Password Guru Professor Lujo Bauer. We are looking forward to the detailed feedback.
Pittsburgh as the Secret Capital of Cyber and Internet security on the US East coast was worth the trip. The visits at the CyLAB (NSA) at Carnegie Mellon University and the Cyber Forensics Training Alliance were very interesting.
Very impressive was the inspiring presentation of the work of the UPCM Information Security team and the problems it is faced with.
Additional we made our first experiences with the app UBER. We are eager to see when the first taxis will really become driverless in Pittsburgh.
Unfortunately, we didn’t get the chance to visit the NSA in Fort Meade.
Instead we were given the possibility to meet representatives of the Computer Security Division of NIST.
The German Federal Ministry for Economic Affairs and Energy (BMWi), AHP International and the German American Chamber of Commerce, Pittsburgh Chapter, have organized a delegation of German cybersecurity companies for the collaboration with and business development in the United States from November 13 to November 18, 2016.
See us at the German –American Cooperation Forum on Cybersecurity Trends and Solutions,
When: 14th November 2016
Where: Pittsburgh, Carnegie Mellon University
Click here for more information.
We are presenting: 8 Agents i a Pass Space – Scramble Your Secrets.
Are you curious?
Click here for a 3-minutes-preview!
Click here for a little longer version with a higher resolution!
November 3, 2015 – time again! The Nordic IT Security Forum opened its doors again, this time at Stockholmsmässan and with a TeleTrust Partner Booth!!!
64 Speakers, 45 Exhibitor and 614 Delegates took part in this event. The event is growing bigger year after year.
This year we put the focus on the demonstration of the App Scrambled Secrets which is visualizing the Multi-Instance-Mode. That means how several instances could collaborate to improve authentication.
We met many interested people in our booth.
Hopefully we will come back next year together with much more German companies standing together in the TeleTrust Partner Booth.
Our demo was followed by the audience with great interest and was awarded with a big applause.
We hope that we were able to convey our ideas on the subject of
Collaborated Security versus Keyhole Security / Multi-Instance-Authentication versus Multi-Factor-Authentication / Scrambled Secrets versus Security through Obscurity
in a convincing manner.
See the video clip of our live demo!
At the Cyber Security Challenge Germany Conference we are going to present for the first time:
“Tutorial on Collaborated Security – 8 Agents in a Pass Space: how to overcome the defensive strategy of building taller walls and digging deeper moats?“
The Keyhole-security has to be gradual transferred into the world of collaborated security and diversification.
Movie clips illustrate how „hacked“ identification and authentication in well-known movies is presented.
What about 8 agents in a Pass Space? A live demo is lifting the veil !
We won ’t show how to hack something rather we are going to demonstrate how several agents jointly perform authentication and how the access to „sensitive goods“ of young people (Photos, app-in-purchases, access to social media platforms) could be made safer.
Additionally following aspects will be discussed: Multi Instance Authentication vs. Multifactor Authentication, Pass Space & Entropy, Scrambled Secrets -Encryption by Scrambling.
When: 16. September 2015
Where: Humboldt Carré am Gendarmenmarkt, Berlin
Im Rahmen der Cyber Security Challenge Germany Konferenz werden wir erstmalig vorstellen:
“Tutorial zur Collaborated Security – 8 Agenten in einem Pass Space: Wie kann die defensive Strategie der immer höheren Burgmauern und tieferen Gräben überwunden werden?”
Eine Überwindung der Keyhole-Security durch die schrittweise Überführung in eine Welt der Collaborated Security (Sicherheit durch Zusammenarbeit) und Diversifikation ist notwendig.
Videoclips illustrieren, wie “gehackte” Identifizierung und Authentifizierung in bekannten Filmen dargestellt wird.
Eine Live-Demo lüftet den Schleier, der über den 8 Agenten in einem Pass Space liegt.
Demonstriert wird: nicht wie man etwas hackt, sondern wie mehrere Agenten bzw. Instanzen gemeinsam eine Authentifizierung durchführen und wie man den Zugang zu “schützenswerten Gütern” eines Jugendlichen (Fotos, App-In-Einkäufe, Zugang zu Social Media Plattformen) sicherer machen kann.
Parallel werden folgende Aspekte diskutiert: Multi Instance Authentifizierung vs. Multifaktor Authentifizierung, Pass Space & Entropie, Scrambled Secrets -Verschlüsselung durch Vermischung.
Wann: 16. September 2015
Wo: Humboldt Carré am Gendarmenmarkt, Berlin
Two important messages made recently the round.
One message was spread one week before the RSA Conference in San Francisco was opened. Namely NSA chief Michael Rogers announced:
“I don’t want a back door. I want a front door. And I want the front door to have multiple locks. Big locks.”
The second spread during the opening key note of the RSA Conference when the new RSA President Amit Yoran introduced himself with the words:
“It is time for a renewed sense of exploration, awareness, and understanding. It’s time for security to escape the Dark Ages and pursue our own Age of Enlightenment.” „Strong authentication, and analyzing who is accessing what, can identify attack campaigns earlier in the kill chain“.
Both messages express the conviction that a paradigm shift in Information Security is needed especially in terms of authentication.
In our press release (April 20, 2015 04:38 AM Eastern Daylight Time):
KikuSema GmbH Takes Part in the Challenge
you see that we already faced this claim by dealing with the issue „Collaborated Security vs Keyhole Security“ and by offering a working solution for a „Multi-Instance Mode / Split-Key Approach“.
A wide range around the topic Password was offered at the conference. Password policy, problems of password manager, password strength, password auditing, Rethinking Android Lock Pattern, Behavioral Biometrics, Password Hashing with Salt & Pepper …to name just a few…
Link to the whole agenda
Link to the proceedings
Link to our presentation video
It was very interesting and important to look at the issue from many different perspectives.
Otherwise there is always a risk that one might be a little blinkered.
Most of the lectures analyzed existing application or protocols. They analyzed faults and weaknesses. Sometimes it sounded a little bit complacent such like – I’ll see if I can make your sandcastle broken.
A lot of things not working well were enumerated without addressing the potential political and social consequences of not solving these faults.
The password will not die in 2015 – as in all previous years.
But – there is a lack of real advanced and tangible implementations to enable the user to move independently and safely within the cyberspace and to protect users’ credentials in an innovative way.
Based on the conviction that we could offer this, we have expected more discussion and feedback during our session.