Make sure there is a match 

Here is a selection of applications I got for the open Ph.D. position in „Process tracking for forensic readiness in operating systems“ (application deadline was yesterday). The most important aspect in finding a good candidate is to find a good fit for the candidate’s abilities and aspirations, the work that needs to be done, the […]

At least pretend to be interested 

I have an open position for a Ph.D. student working on process tracking for forensic readiness in operating systems. There are clear instructions in the announcement how to apply. Nevertheless, I sometimes get emails that are not aimed at the announced position. Take a look at the picture. The candidate is „extremely motivated to apply“. So motivated […]

Become a security diva 

If you are a woman considering information security as a choice for your bachelor degree, continue reading. Here is what I suggest: Take part in the Security Divas 2013 conference. This event has information security as its main topic and spans from social media, communication, risk analysis to mobile devices and massive attacks on banking […]

Applying for a bachelor in information security at HiG 

I gave a talk on our bachelor in information security programme this week. The college had invited 400 pupils who are about to finish school and may apply for our bachelor programmes next spring. Putting together a presentation, I realized once again how many events related to information security there are and how much HiG/NISlab […]

Happy birthday, NISlab 

NISlab, the information security research group at HiG, started ca. ten years ago. The exact date is debatable, so we decided to celebrate in the autumn of 2012. Coincidentally, this is also European Cyber Security Month. A lot has happened since then. The department of forestry ceased its activity at the Brandbu campus and funds […]

Incorrect data in read-only field 

The Research Council of Norway operates an electronic submission system for grant proposals. It works quite well overall. Ok, text boxes accepting 3,000 characters should be larger than just four lines and should not scroll out of view when repositioning the cursor. Ok, columns in the budget table should follow the project period and should […]

How not to apply for a Ph.D. stipend 

I have been busy these days reading applications for open Ph.D. student positions. I like to share some sentences from two candidates who will not make it to the next round. One candidate did not exactly leave the impression he was willing to finish within time and budget constraints: „It is good to have an […]

Time spent in 2011 

The week before Christmas break. It has become quiet at the college, colleagues are decreasing their time balance, students have vanished after their exams and will return in January. I log my time at work using TimePanic. Looking back at hours logged in 2011, I worked 1,921 hours, mostly at the office. I spent 43% […]

November 30th was Computer Security Day 

From http://www.computersecurityday.org/: „Computer Security Day was started in 1988 to help raise awareness of computer related security issues. Our goal is to remind people to protect their computers and information. This annual event is held around the world on November 30th although some organizations choose to have functions on the next business day if it […]

Increasing screen real estate 

I have always been fascinated by work places with multiple monitors. Years ago, it was expensive to have two monitors. With the decline of prices for LCD panels, two monitors became affordable for many. At my previous workplace two monitors was standard equipment for developers, and the young interns we had could not be impressed […]