Author Archives: Rolf
Do we still need technical reference books?
Given the fact that AI tools like ChatGPT are able to generate texts on the fly, one may wonder whether we still need technical reference books (that are produced over an overlong period of time), or whether they may have … Continue reading
Cyber Risk Management
A short article (column) entitled “How To Manage Cyber Risks – Lessons Learnt from Medical Science” will appear in the January 2023 issue of the IEEE Computer magazine. The article is co-authored by Andreas GrĂ¼nert, and it continues some lines … Continue reading
Lessons learnt from Log4j
The recent Log4j turmoil has revealed severe problems and structural difficulties in the way we develop and market software. Very frequently, some open source software components, like the Log4j library, are built into larger software products and may even become … Continue reading
Can a Lemon Market Remdey a Lemon Market?
It is commonly agreed that the market for cybersecurity products and services is what economists call a lemon market (according to the 1970 work of the economist George Akerlof who was jointly received the prestigious Nobel Memorial Prize in Economic … Continue reading
Is E2EE Conferencing Meaningful?
In these days, my new book entitled End-to-End Encrypted Messaging is being printed and prepared to be shipped. Due to this fact, but mainly due to the Corona crisis, I am often asked these days whether the various conferencing tools … Continue reading
New Book Released Soon
My new book about secure and end-to-end encrypted (E2EE) messaging will be released soon. It addresses E2EE messaging protocols, like OpenPGP and S/MIME, as well as OTR, Signal, iMessage, Wickr, Threema, Telegram, and many more. The core of the book … Continue reading
Intelligence-Driven Cyber Defense
In a 2015 article, I argued that conventional wisdom in information security management is deeply flawed, because it requires a risk-based approach knowing well that any form of risk analysis – be it quantitative or qualitative – is somehow arbitrary … Continue reading
CALL FOR QUESTIONS
I have added a cryptology blog named CRYPTOlog to the Web site of eSECURITY Technologies Rolf Oppliger (cryptolog.esecurity.ch). The aim is to answer questions related to cryptology that are of common interest. I am looking forward to receive many interesting … Continue reading