IDPS-ESCAPE (v0.4): RADAR for enhanced SOAR Capabilities

Posted by & filed under News.

Risk-aware Anomaly Detection-based Automated Response The IDPS-ESCAPE team is excited to announce a major update to the RADAR subsystem, delivering new SOAR capabilities for automated threat detection and response in modern Security Operations Centers (SOCs). Click here to read the whole article

Launch of our new Whistleblowing service – WBaaS

Posted by & filed under News.

itrust consulting is pleased to announce the launch of Whistleblowing as a Service. WBaaS ensures a way to report violations of the law within a company without repercussions for the employee, ensuring conformity to the law of 16 May 2023, concerning companies with over 50 employees and communes with over 10 000 inhabitants. The service includes the setup of an internal channel, and our expert will review any reports made via the platform to verify the appropriate anonymization and clarity of the information provided. Only authorized and mandated people of the targeted organization get access to the report. It is possible to make a report via phone call or in a meeting, but the easiest method is to file it on the platform, which guarantees the highest security standards.  For more information, click here.

Cybersecurity: An opportunity for vendors – a nightmare for insiders

Posted by & filed under News.

Article for Lëtzebuerger Gemengen At a time when organized crime has found a goldmine in cyber-attacks, generating profits faster than drugs, and when heads of state intent on endangering our democracy are funding cyber-crime, defense no longer holds water, and leaders are repeating their mistakes, according toCarlo Harpes, head of itrust consulting and a dedicated insider since 1992. To read the full article, click here.

Cybersecurity: An opportunity for vendors – a nightmare for insiders

Posted by & filed under Publications.

Article for Lëtzebuerger Gemengen At a time when organized crime has found a goldmine in cyber-attacks, generating profits faster than drugs, and when heads of state intent on endangering our democracy are funding cyber-crime, defense no longer holds water, and leaders are repeating their mistakes, according to Carlo Harpes, head of itrust consulting and a dedicated insider since 1992. Is now the right time to sell cybersecurity enhancements? Many companies sell monitoring, detection and insurance tools, which decision-makers buy to ease their conscience rather than to control the situation. This often increases complexity and dependence on the cloud and external players, who are better armed, but also more exposed to large-scale breakdowns. So we need to reduce these dependencies and strengthen local skills and means of action. Can you illustrate these dependencies? Ukraine got cheap communication terminals from Starlink before realizing that they depend on one person, Elon Musk, who has the power to decide whether or not to shut down the majority of military communications. Many companies create subcontracts with no exit plan and no idea of the cost of a divorce. Wind turbines in Europe were at a standstill at the start of the war over Ukraine following a cyber attack on communications equipment in the Viasat satellite used by over 5,000 wind turbines. The EU has passed a directive on cybersecurity, NIS2. Will it be effective? At the NISDUC user conference organized by ILR in Luxembourg in May, the experts all agreed: NIS2 simply makes mandatory what every organization should have done long ago. NIS2 does not prescribe technical solutions, but rather risk management, i.e. adequate documentation of risks and countermeasures, assumption of responsibility by management, which can be disavowed if necessary, orientation towards standards, and mandatory security in certain areas, such as asset management. What’s the situation in Luxembourg? Sad, which brings me to my first nightmare: the HCPN and Parliament have failed to transpose the directive within the 2-year timeframe. At the beginning of May, the Minister Delegate expressed the hope that this would be done by the end of 2025, i.e. more than a year late. Where are Luxembourg’s ambitions for leadership in digitalization? The legislator received 10 well-founded formal objections, and 7 months later, no correction is available. That’s why several potential customers have told me they’d rather wait for the law and an ILR order than prepare now. For security managers, this… Read more »

C5-DEC CAD Version 1.0 release on 7 May 2025

Posted by & filed under News.

We are happy to announce the stable release of C5-DEC CAD Version 1.0 on GitHub. C5-DEC CAD is a comprehensive tool designed to support the creation and evaluation of secure IT systems according to the Common Criteria (CC) standards, from secure software development and meticulous documentation management, to Common Criteria-based security evaluations and project management. Click here to read the whole article