23 Posts

Koen Van Impe

Security Analyst

Koen Van Impe is a security analyst who worked at the Belgian national CSIRT and is now an independent security researcher. He has a twitter feed (@cudeso) and a personal blog (www.vanimpe.eu). Koen is passionate about computer security, incident handling, network analysis, honeypots, Linux, log management and web technologies. He is responsible for the follow-up and coordination of computer security incidents and gives security advice to customers.

Written By Koen Van Impe

Understanding the SPF and DKIM Spam Filtering Mechanisms

Sender Policy Framework and DomainKeys Identified Mail are two techniques that can be used to limit the amount of spam in inboxes.

Will Blockchain Technology Replace Traditional Business Models?

Blockchain technology has become a hot trending topic within the computer world in the last couple years. There's more to it than just bitcoins.

Security Training for Incident Handling: What Else Is Out There?

This follow-up article offers even more options for improving incident handling through training courses, workshops and challenges.

The New Glibc Getaddrinfo Vulnerability: Is It GHOST 2.0?

Is the new glibc getaddrinfo vulnerability really GHOST 2.0? Signs point to yes, so organizations should patch this vulnerability immediately.

Security Training for Incident Handlers: What’s Out There?

Security professionals focused on incident handling and response have the opportunity to learn a lot from security training and certifications.

Defending Against Apache Web Server DDoS Attacks

Here's what you need to know about Web server DDoS attacks, how to defend against them and what tools are available to help in your efforts.

Comparing Different Tools for Threat Sharing

Threat sharing is getting more and more attention from security professionals to detect and quickly respond to security threats.

Signature-Based Detection With YARA

Security researchers on the lookout for another resource to help with malware detection should consider the pattern-matching tool YARA.

Comparing Free Online Malware Analysis Sandboxes

Free malware analysis sandboxes can be used as a means of enhancing cybersecurity without a major drain on time, money and other resources.

Does the VENOM Vulnerability Affect You?

The VENOM flaw is the latest security vulnerability to come to light. But are you at risk? And how should you react if your data is suceptible to attacks?