Latest News

A Proactive Approach To Vulnerability Management: 3 Steps

Oct 22, 2016 6:00 pm

Having the tools to detect a breach is important, but what if you could prevent the attack from happening in the first place?

Zenmap – Official Cross-Platform Nmap GUI

Oct 22, 2016 2:46 pm

Mirai-Fueled IoT Botnet Behind DDoS Attacks on DNS Providers

Oct 22, 2016 12:00 pm

Ten percent of the 550,000 IoT nodes in the Mirai botnet are involved in ongoing DDoS attacks against DNS provider Dyn and others.

Massive DDoS Attack Against Dyn DNS Service Knocks Popular Sites Offline

Oct 22, 2016 10:20 am

Cyber attacks are getting evil and worst nightmare for companies day-by-day, and the Distributed Denial of Service (DDoS) attack is one such attacks that cause a massive damage to an...

An Army of Million Hacked IoT Devices Almost Broke the Internet Today

Oct 22, 2016 10:13 am

A massive Distributed Denial of Service (DDoS) attack against Dyn , a major domain name system (DNS) provider, broke large portions of the Internet on Friday, causing a significant outag...

Major US DNS provider hit with DDoS, part of the Internet becomes unreachable

Oct 22, 2016 1:20 am

US-based DNS provider Dyn has suffered a massive DDoS attack earlier today, and it resulted in many websites being completely or intermittently inaccessible for a few hours. According to status report...

Hacked Cameras, DVRs Powered Today’s Massive Internet Outage

Oct 21, 2016 11:57 pm

A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites was launched with the help of hacked "Internet of Things" (IoT) devices, su...

Dirty COW Linux kernel zero-day exploited in the wild is now patched

Oct 21, 2016 10:11 pm

Linux developer Phil Oester has spotted attackers exploiting a Linux kernel zero-day privilege escalation flaw that dates back to 2007, and has raised the alarm. The vulnerability (CVE-2016-5195) has ...

Bill Breakdown Mini-Series

Oct 21, 2016 9:44 pm

Mozilla Turning TLS 1.3 On By Default With Firefox 52

Oct 21, 2016 8:49 pm

Martin Thomson, a Principle Engineer at Mozilla confirmed TLS 1.3 will be turned on by default in Firefox 52.

Black Hat Europe 2016: The 7 Habits of Highly Effective Security Operations

Oct 21, 2016 8:00 pm

Why cyber analysts spend nearly 75% if their time on false positives, and what to do about it.

NSA Contractor Over 20 Years Stole More Than 50 Terabytes Of Gov't Data

Oct 21, 2016 7:10 pm

Harold Martin, now in custody, is a risk to himself and others if freed from custody, a US prosecutor warns in a detailed filing in the case.

Linux Kernel Vulnerability

Oct 21, 2016 6:50 pm

Original release date: October 21, 2016 US-CERT is aware of a Linux kernel vulnerability known as Dirty COW (CVE-2016-5195). Exploitation of this vulnerability may allow an attacker to take control...

Cyber Training For First Responders To Crime Scene

Oct 21, 2016 6:00 pm

FBI ties up with police association and Carnegie Mellon University to improve working knowledge of cyber investigations.

Linux kernel bug: DirtyCOW “easyroot” hole and what you need to know

Oct 21, 2016 5:58 pm

No sooner had we written about long-lived Linux kernel bugs...and along comes an 11-year-old vulnerability that's easy to exploit.

Millions of AdultFriendFinder user accounts hacked – again

Oct 21, 2016 5:52 pm

One hacker is claiming to have stolen a database of 73 million users: a whole lot of details for a whole lot of people who'd rather keep that bedroom door closed.

Serious Dirty Cow Linux Vulnerability Under Attack

Oct 21, 2016 5:21 pm

A privilege escalation vulnerability, nicknamed Dirty Cow and present in Linux since 2007, has been used in public attacks against web-facing Linux servers.

DDoS Attack On DNS Provider Disrupts Okta, Twitter, Pinterest, Reddit, CNN, Othe...

Oct 21, 2016 5:15 pm

Brief but widespread attack illuminated vulnerability of the Internet's Domain Name System (DNS) infrastructure.

Threatpost News Wrap, October 21, 2016

Oct 21, 2016 5:11 pm

The dangers of Skyping and typing, the fingerprint warrant story, hiding credit card numbers in images, and more are discussed.

43+ million users affected by confirmed Weebly breach

Oct 21, 2016 5:01 pm

Weebly, a popular web-hosting service featuring a drag-and-drop website builder, has been breached, and email addresses/usernames, IP addresses and encrypted passwords for some 43 million users have b...

Security Awareness

Hello and welcome!

My name is Marcus Burkert and I’m working as Manager Cyber Security at KPMG Switzerland AG.

As Manager Cyber Security, it is my passion to perform a whole variety of security assessments, such as vulnerability- and penetration tests, in order to ensure that enterprise IT environments are secured. I love to accomplish my IT security role by devising fresh and innovative new security architectures for enterprise IT environments. This allows an expression of creativity within my mandate, by improving the quest to optimize and streamline the IT security processes as well as to provide a strong value for the company’s IT security effort.

I work in environments which require lateral thinking combined with a multi-disciplinary approach; from engaging in negotiations with suppliers in the procurement and implementation process of IT security infrastructures as well as developing appropriate security processes and procedures. My professional development and career over the last 16 years within the realm of IT, is a great advantage for this.

In my current role as Manager Cyber Security, I am working on the design and implementation of innovative security architectures for enterprise IT environments, as well as on the development of adequate security policies and processes to support the IT Security effort of the clients. Concomitant to this, I am acting as IT Security Advisor and Auditor for various clients and perform risk analysis and assessments as well as the whole cornucopia of security processes and audits to underpin the security architectures - such as security assessments, vulnerability- and penetration tests as well as computer security incident response and forensic investigations.

I have a good track record of providing IT security for companies across diverse industries. My aim is to reach and/or exceed targets and to provide a strong value to each project. I would love to support you on the adventurous journey through the jungle of information security & risk management. As we all know; there is no such thing as “ghost in the machine / in the wires”.

If you’re interested, please do not hesitate to contact me. I look forward to hearing from you.


Cookie Policy

This site uses cookies to store information on your computer.

Do you accept?