Cyber Security Challenge Germany Conference- Tutorial on Collaborated Security – 8 Agents in a Pass Space

At the Cyber Security Challenge Germany Conference we are going to present for the first time:
“Tutorial on Collaborated Security – 8 Agents in a Pass Space: how to overcome the defensive strategy of building taller walls and digging deeper moats?“blog_vorher
The Keyhole-security has to be gradual transferred into the world of collaborated security and diversification.
Movie clips illustrate how „hacked“ identification and authentication in well-known movies is presented.
What about 8 agents in a Pass Space? A live demo is lifting the veil !
We won ’t show how to hack something rather we are going to demonstrate how several agents jointly perform authentication and how the access to „sensitive goods“ of young people (Photos, app-in-purchases, access to social media platforms) could be made safer.
Additionally following aspects will be discussed: Multi Instance Authentication vs. Multifactor Authentication, Pass Space & Entropy, Scrambled Secrets -Encryption by Scrambling.

When: 16. September 2015
Where: Humboldt Carré am Gendarmenmarkt, Berlin

Cyber Security Challenge Germany Konferenz – Tutorial zur Collaborated Security – 8 Agenten in einem Pass Space

Im Rahmen der Cyber Security Challenge Germany Konferenz werden wir erstmalig vorstellen:
“Tutorial zur Collaborated Security – 8 Agenten in einem Pass Space: Wie kann die defensive Strategie der immer höheren Burgmauern und tieferen Gräben überwunden werden?”
Eine Überwindung der Keyhole-Security durch die schrittweise Überführung in eine Welt der Collaborated Security (Sicherheit durch Zusammenarbeit) und Diversifikation ist notwendig.
Videoclips illustrieren, wie “gehackte” Identifizierung und Authentifizierung in bekannten Filmen dargestellt wird.
Eine Live-Demo lüftet den Schleier, der über den 8 Agenten in einem Pass Space liegt.
Demonstriert wird: nicht wie man etwas hackt, sondern wie mehrere Agenten bzw. Instanzen gemeinsam eine Authentifizierung durchführen und wie man den Zugang zu “schützenswerten Gütern” eines Jugendlichen (Fotos, App-In-Einkäufe, Zugang zu Social Media Plattformen) sicherer machen kann.
Parallel werden folgende Aspekte diskutiert: Multi Instance Authentifizierung vs. Multifaktor Authentifizierung, Pass Space & Entropie, Scrambled Secrets -Verschlüsselung durch Vermischung.

Wann: 16. September 2015
Wo: Humboldt Carré am Gendarmenmarkt, Berlin

KikuSema GmbH Takes Part in the Challenge – Change Todays Security Thinking – with a Multi-Instance-Mode/Split-Key-Approach

press2015Two important messages made recently the round.
One message was spread one week before the RSA Conference in San Francisco was opened. Namely NSA chief Michael Rogers announced:
“I don’t want a back door. I want a front door. And I want the front door to have multiple locks. Big locks.”
The second spread during the opening key note of the RSA Conference when the new RSA President Amit Yoran introduced himself with the words:
“It is time for a renewed sense of exploration, awareness, and understanding. It’s time for security to escape the Dark Ages and pursue our own Age of Enlightenment.” „Strong authentication, and analyzing who is accessing what, can identify attack campaigns earlier in the kill chain“.
Both messages express the conviction that a paradigm shift in Information Security is needed especially in terms of authentication.
In our press release (April 20, 2015 04:38 AM Eastern Daylight Time):
KikuSema GmbH Takes Part in the Challenge
you see that we already faced this claim by dealing with the issue „Collaborated Security vs Keyhole Security“ and by offering a working solution for a „Multi-Instance Mode / Split-Key Approach“.

Review – PASSWORD 2014 Conference, December 8-10 2014 in Trondheim

A wide range around the topic Password was offered at the conference. Password policy, problems of password manager, password strength, password auditing, Rethinking Android Lock Pattern, Behavioral Biometrics, Password Hashing with Salt & Pepper …to name just a few…
Link to the whole agenda
Link to the proceedings

It was very interesting and important to look at the issue from many different perspectives.
Otherwise there is always a risk that one might be a little blinkered.
Most of the lectures analyzed existing application or protocols. They analyzed faults and weaknesses. Sometimes it sounded a little bit complacent such like – I’ll see if I can make your sandcastle broken.
A lot of things not working well were enumerated without addressing the potential political and social consequences of not solving these faults.

The password will not die in 2015 – as in all previous years.
But – there is a lack of real advanced and tangible implementations to enable the user to move independently and safely within the cyberspace and to protect users’ credentials in an innovative way.
Based on the conviction that we could offer this, we have expected more discussion and feedback during our session.

PASSWORD 2014 Conference, December 8-10 2014 – Trondheim

We are going to present our FABULAROSA & THE 5 NEW PROTOCOLS at the PASSWORD2014 Conference December 8-10 2014 in Trondheim.
This time we are revealing what is meant by SCRAMBLED SECRETS in a live demo.
See us on Monday ! Program schedule
Passwords is the first and only conference of its kind, where leading researchers, password crackers, and experts in password security from around the globe gather in order to better understand the challenges surrounding digital authentication, and how to adequately address them. Passwords was launched in Bergen, Norway in 2010, motivated by dissatisfaction with the robustness and usability of current authentication solutions. Now in its fifth year, Passwords is held twice a year.
More information on or follow #passwords14
We are looking forward many questions and new contacts.

Säkerhetsdagen – Nordic IT Security 2014 , November 5th, Stockholm

Back in Stockholm!
This compact day was packed with many interesting sessions.
The highlight was once again the session of David Jacoby (Kaspersky). This year about the topic: Hacking my own home – Hacking of Things: a concrete look at IoT and how secure it is.
The location was very well suited to combine the exhibition with presentations at the main stage.
There were a lot more vendors and visitors than last year. See more:
In addition to Scandinavian languages and English you could listen to Dutch and French.
We were pleased to be able to present our FABULAROSA to interested professionals and looking forward next year, maybe together with some German exhibitors.
Here’s a snapshot of the event:

FABULAROSA AND THE FIVE NEW PROTOCOLS honored as Gold Winner in the 6th Annual 2014 Golden Bridge Awards for Mobile Security Solution

KikuSema GmbH/AB has earned the prestigious Gold Winner status in the Golden Bridge Awards for their FABULAROSA AND THE FIVE NEW PROTOCOLS.
More than 40 judges from a broad spectrum of industry voices from around the world participated and their average scores determined the 2014 Golden Bridge Business Awards winners.

Golden Bridge Awards are an annual industry and peers recognition program honoring best companies in every major industry from large to small and new start-ups in North America, Europe, Middle-East, Africa, Asia-Pacific, and Latin-America.

FABULAROSA AND THE FIVE NEW PROTOCOLS Named as Finalist in the 6th Annual 2014 Golden Bridge Awards for Mobile Security Solution

KikuSema GmbH has been recognized as a finalist in the Annual 2014 Golden Bridge Awards for its FABULAROSA AND THE FIVE NEW PROTOCOLS.

The coveted annual Golden Bridge Awards program ( with active participation from a broad spectrum of industry voices, encompasses the world’s best in organizational performance, products and services, innovations, executives and management teams, women in business and the professions, case studies and successful deployments, public relations and marketing campaigns, product management, websites, blogs, white-papers, videos, advertisements, creativity, partner programs, and customer satisfaction programs from every major industry in the world.


Once again: FabulaRosa presented on the occasion of the International Study Visit of the Hong Kong Baptist University at the Institute of Management Berlin on 20 May 2014

Once again I was asked to give a corporate lecture in front of MBA students of the Hong Kong Baptist University at the Institute of Management Berlin
This year about forty students have listened with great interest. Many photos have been taken and our app has been directly downloaded several times during the event.
Many questions were asked. A big issue was – How to protect my privacy efficiently?
I hope that my lecture is going to continue next year.

Nordic IT Security 2013 – Small but Powerful – 6th November, Stockholm

The Nordic IT Security Summit held in Stockholm on 6th November was a compact conference and exhibition day.
The topic was „Secure Your IT Infrastructure against NEX-GEN threats“.
About 250 participants took part in the wide range of presentations and visited the Expo.
Compared to the relative small market of only 25 million inhabitants in Scandinavia, this summit had an attractive size.
The whole day was very well organized and with the forums: Power Lunch, Roundtable Discussion and 7-minute TechTalk well structured.
There were enough possibilities for networking.
Highlights of the presentations were the live hacking demo of David Jacoby of the Kaspersky Lab team and
the detailed explanations of John Daniels on the topic: „How the NSA and GCHQ hacks the world and how it threatens Swedish companies and agencies“.
We were one of the exhibitors and made some contacts.
We hope to open up a new market.
Maybe we will come back to Stockholm next year.