Knowledge sharing

We emphasize knowledge sharing. It's our way of enhancing domain expertise and pushing the boundaries of conventional practices. Our efforts take various forms, from podcasts to technical content and presentations. Our consultants are also available for private presentations and workshops to share our insights and expertise.

Post image
Nordic Cyber Summit 2023: Opinionated Recap by Olav

Kim, who serves as the Head of Digital Security at Fjord Line, kindly invited me, Olav, to accompany him to the Nordic Cyber Summit 2023 in Copenhagen. Here's my take on the summit, with a bit of my own perspective.

Read article ->
Post image
Cloud Security Transformation, Part 1: Business strategy and people

Whether you've already embarked on your cloud journey, are midway through migration, or are still in the early stages of cloud adoption, security is hopefully at the forefront of your mind. But let's be honest: Cloud security isn't a walk in the park, especially when facing a shortage of experts with an in-depth comprehension of cloud security.

Read article ->
Post image
Storm-0558 key acquisition commentary

Earlier this year, it came to light that Microsoft had suffered a breach that resulted in the theft of customer emails. A threat actor dubbed Storm-0558 was able to acquire a Microsoft Account (MSA) signing key that allowed them to forge authentication tokens and access Microsoft customer emails. This was in some ways the first high profile attack against a cloud provider that resulted in the direct compromise of customer data. Yet until now, little has been known about how the threat actor acquired the MSA signing key, and what the initial compromise was that led to these events.

Read article ->
Post image
S04E11 - Sikkerhetsfestivalen, historien bak O3 CYBER og veien videre

Beskrivelse: I ellevte episode av sesong fire er vi live på Sikkerhetsfestivalen i Lillehammer hvor vi snakker om hvorfor vi valgte å starte O3 Cyber, hvordan reise har gått så langt, blemmer og utfordringer, resultater og veien videre. Level: 100 Kilder som nevnes/anbefales: – ⁠⁠⁠⁠https://o3c.io⁠ Medvirkende: - Olav Østbye, O3 CYBER - Karim El-Melhaoui, O3 CYBER - Håkon Nikolai Stange Sørum, O3 CYBER Følg oss! – ⁠⁠⁠⁠⁠⁠https://www.linkedin.com/company/O3CYBER⁠⁠⁠⁠⁠⁠ – ⁠⁠⁠⁠⁠⁠https://twitter.com/O3CYBER⁠⁠⁠⁠⁠⁠ – ⁠⁠⁠⁠⁠⁠https://github.com/O3-Cyber ⁠⁠⁠⁠ Ris og ros? Gi oss gjerne en tilbakemelding, både positive og forbedringspotensiale. Dette kan du gjøre via ⁠⁠⁠⁠⁠⁠kontakt oss⁠⁠⁠⁠⁠⁠ på nettsiden vår, ⁠⁠⁠⁠⁠⁠O3C.no⁠⁠⁠⁠⁠⁠ Forslag til nye episoder? Skulle du ha noen ønsker/forslag til nye episoder så ta gjerne ⁠⁠⁠⁠⁠⁠kontakt med oss⁠⁠⁠⁠⁠⁠ med oss via nettsiden vår, ⁠⁠⁠⁠⁠⁠O3C.no

Listen to episode
Post image
S04E10 - Sikkerhetsfestivalen, Cloud Security

Beskrivelse: I tiende episode av sesong fire snakker vi om Cloud Security live på sikkerhetsfestivalen i Lillehammer. Level: 100 Kilder som nevnes/anbefales: – ⁠⁠⁠https://o3c.io Medvirkende: - Olav Østbye, O3 CYBER - Karim El-Melhaoui, O3 CYBER - Håkon Nikolai Stange Sørum, O3 CYBER - Melvin Langvik, TrustedSec Følg oss! – ⁠⁠⁠⁠⁠https://www.linkedin.com/company/O3CYBER⁠⁠⁠⁠⁠ – ⁠⁠⁠⁠⁠https://twitter.com/O3CYBER⁠⁠⁠⁠⁠ – ⁠⁠⁠⁠⁠https://github.com/O3-Cyber ⁠⁠⁠ Ris og ros? Gi oss gjerne en tilbakemelding, både positive og forbedringspotensiale. Dette kan du gjøre via ⁠⁠⁠⁠⁠kontakt oss⁠⁠⁠⁠⁠ på nettsiden vår, ⁠⁠⁠⁠⁠O3C.no⁠⁠⁠⁠⁠ Forslag til nye episoder? Skulle du ha noen ønsker/forslag til nye episoder så ta gjerne ⁠⁠⁠⁠⁠kontakt med oss⁠⁠⁠⁠⁠ med oss via nettsiden vår, ⁠⁠⁠⁠⁠O3C.no

Listen to episode
Post image
Security considerations for hosting domain controllers in cloud

While Domain Controllers might not be something that new organizations, those born in the cloud would rely on today, it seems common for most existing organizations that seek to migrate

Read article ->