ISSE 2017, Europe's international information security conference, on cybersecurity, identity and access, privacy and other developments. Organized by EEMA, supported by LSEC.

Brussels, November 14 and 15th at Deloitte's, in Diegem, Belgium.


Published in News
%AM, %10 %462 %2015 %10:%Aug

IBM finds major Android phone bug


IBM security researchers have found a way to exploit an Android flaw that puts more than 55 per cent of Android phones at risk of being taken over by persistent attackers.

Published in News
%PM, %19 %664 %2015 %14:%Mar

Internet of Things

LSEC is supporting IoT technology development, Enterprise IoT and Industrial Internet 

The Internet of Things is the internet of connected smart sensors and objects with an internet connections such as home automation devices for lightning, domotics; but also connected cars and the connected industry. LSEC's experts have been focusing for the last years in enabling security measures for Enterprise IoT and Industrial IoT. LSEC experts can provide advisory services and technology for embedded systems and technologies. 

Some more documentation on LSEC's IoT activities can be found : 


Upcoming events and activities on IoT, Industrial Internet and : 

April 30th : 2015, the year all things break loose, the second IoT activity, with an interest in Security and Privacy of the Embedded Devices and platforms

May 28th : Industrial Automation Security 2015, how security systems are being put in action in industrial environments and how they are impacting the business


Documents and White Papers available : get yourself informed with this collection of relevant recent documents and materials.



Future programs for IoT:

LSEC is launching the 3IF project in May 2015, a program to support the transformation of manufacturing companies towards becoming factories of the future, by utilizing smart sensors, IoT technologies and components. For more information stay in touch with LSEC and



Published in Slider homepage
%AM, %06 %507 %2015 %11:%Mar

Mobile Security

The World is going Mobile…..
And so are the Risks
In 2015, mobile computing causes ongoing concern for CIOs and CISOs everywhere, dealing with the
introduction of new smartphones and tablets, sensitive corporate information stored on employee devices, and an explosive business demand for mobile applications. In this era of hyper connectivity, all
devices are connected, from cars to refrigerators to all kinds of consumer electronics, allowing existing vulnerabilities to be exploited in multiple ways. But.....Mobility also provides a unique opportunity for genuine business innovation in these pressed economic times. This document contains a selection of white papers, press releases and product information about Mobile Security Solutions that will further drive the innovation of the Mobile Sector; and support a secure mobile experience for end users.
Brought to you by LSEC and IPACSO, two vendor independent organizations that aim to support Secure and Trustworthy Mobile Innovations in Europe.


Published in Topics
%PM, %02 %562 %2012 %12:%Feb

Mobile Security Solutions

Mobile Security Solutions cover a wide range of topics related to the challenges posed by the use of mobile devices in an enterprise or government context.

Mobile devices such as smart phones, tablets, phablet, but also portable gaming devices, payment and other functional terminals and many other portable devices using a wireless network. The wireless protocals being used can vary and are usually complementary : GSM, 2-4 and even 5G, Wifi, Bluetooth, NFC, RFID, Zigbee, ... 
Mobile devices are typically running common operations systems such as Android or derived forms of Android such as Wearable Android, IoS, Windows Mobile, Blackberry, Symbian and some older OS-es in many versions and variations. 

Part of the complexity of the challenges with Mobile devices is the fact that most individuals have a preference for a device based upon taste, budget, functionality and appreciated ease of use, amongst many other parameters. Enterprises are trying to cope with this by setting up a Mobile Device Management program, either disallowing any devices on corporate networks which have not been authorized by the corporate IT / Security divisions. Others have set up platforms allowing to control the business data being hosted on the mobile devices. 

LSEC has a wide based of expertise and experts in the domain, from ensuring protection from the embedded layers to the level of avoiding reverse engineering. 

Some activities being held on the topic : 

End Point Protection, a shift towards End Point Intelligence :

Mobile Apps - Major Security and Privacy Developments - 2014 and beyond :


Upcoming Mobile Security Events and Seminars : 



Other relevant documentation that can be found. 



Some of the LSEC Expert Members on Mobile Security : 


Published in Topics

LSEC & IPACSO at Mobile World 2015 : Mobile Security Solutions

LSEC and IPACSO collected a number of European innovative mobile security solutions, that collectively support a secure mobile experience, and that will further drive innovation within the mobile sector. Whether you are an operator looking for business opportunities, a manufacturer looking for the latest technology integrations, a service provider to harden your solutions...We will inform your about: Mobile authentication and access control, mobile to manage payments and serve as payment token, using mobile to facilitate offline transactions, ensuring the security of apps and the OS, protecting privacy of mobile users and many more to discover at Booth 7G71 at Mobile World Congress 2015.

More info: Mobile Security Section 

Published in News
%AM, %09 %041 %2014 %00:%Dec

Mobile Security & Privacy

Mobile Security with LSEC ranges from all physical considerations such as the wireless channels and the embedded components (controllers, memory, physical connections, ...) to all aspects on the application layers (from apps, to appstores, messaging influencing mobile browsing,....). Mobile includes also BYOD, portability, next to integration of internet into mobile appliances (in car, IoT, ...) 


A collection of cases and perspectives from the last couple of years.



This collection will be updated regularly and provides a good introduction on the current challenges for Mobile. 

The respective experts can be asked for more information and detailed expertise. 


Published in Expertises
%AM, %28 %041 %2014 %00:%Nov



Rosberg System is a Norwegian owned technology company with unique security & management solutions aimed at the Enterprise and Education markets. The company was founded in 2008 and has offices in Norway, Spain and Mexico. Rosberg's core values are Smart, Simple & Solid. We believe that simplicity is the ultimate sophistication, and this is reflected in our patented technologies which partners often describe as "out of the box thinking".

The market challenges we address:

  • Security issues with wireless connections including roaming devices and highly complex solutions generating a high CPU load, Code complexity (there is always a way in), CPU memory disk and power consumption.
  • Schools network challenges with remote management and content delivery.
  • Reactive antitheft solutions with antitheft measures only after a device is stolen.
  • Reaching devices behind your customer's firewalls.
  • Reaching mobile M2M devices securely.

Rosberg's technology brand is Verji, an ancient Norwegian word describing the one who protects. Our technology development is focused on highly scalable solutions with global market potential, enhanced security and unique protected intellectual property.

The new generation wireless security

Reaching Anything, Anywhere, Anytime

Rosberg offer solutions for both the IT & Networks market and the M2M market.
Within the IT & Networks market we have solutions aimed towards the enterprise and education market.

For the Enterprise market we offer an IT management solution which also can manage all roaming devices with a new and high level of security by using Rosberg's connection method Verji Connect. An additional module is our unique antitheft solution Verji Lock, were information stored on a device is only accessible when the device is operational with the authorized user. As soon as the device hibernates the encryption keys are deleted and keys can only be recovered from secure resource after user is securely identified.

For the education market we offer our School solution which is an affordable, enterprise-level management system for school laptops and tablets. It keeps the computers up to date and easy to manage both from a local and centralized level. The school solution includes Verji Share, which makes it possible for teachers to easily access and deploy, software, updates and content to students, even in areas with limited bandwidth. Rosberg's School solution is approved by Intel Learning Series and is marketed on Intel's website.

Within the M2M market our main focus is to license our technology solutions to companies which can achieve enhanced security and cost reduction by using the technology. Our main licensing technology is Verji Connect which makes it possible to establish a secure connection to any device, anywhere and anytime. We can also deliver our unique secure connection software as an SDK.

Published in Experts
%AM, %14 %041 %2014 %00:%Nov

XLAB Research


A company that acts as a bridge between academia and industry

XLAB is an R&D company with a strong research background in the fields of distributed systems, cloud computing, security and dependability of our systems, information visualization (, 2D, 3D GIS, sensors) and image processing (3D reconstruction, segmentation, GIS data fusion).

The results of the R&D activities are reflected in the advanced online collaboration software ISL Online, GIS and visualization solution - Gaea+, in our civil protection solutions and in the sophisticated medical imaging solutions - MedicView.

Published in Experts
%AM, %17 %041 %2014 %00:%Oct


GuardSquare Hor Small

We are the world's leading provider of optimization and obfuscation software for Java and for Android. We develop and support ProGuard, the successful open source obfuscator for Java, and DexGuard, its specialized sibling for Android. We serve small developers, banks, gaming companies, media companies, hardware manufacturers, e-commerce companies, and everything inbetween. Our mission is to optimize and protect your applications, to save you time, effort, and money.

DexGuard is a specialized protector and optimizer for Android, making apps faster, more compact, and more difficult to crack. DexGuard automatically applies advanced techniques, providing layers of protection, significantly raising the bar for reverse engineering.

ProGuard is a free generic optimizer and obfuscator for Java bytecode. Over the years, it has solidly become the industry standard in its field. It is the default tool in development environments like Oracle's Wireless Toolkit, Netbeans, EclipseME, Intel's TXE SDK, and Google's Android SDK.

Published in Experts
Page 1 of 2

LSEC for Security Professionals


LSEC for Security Companies



LSEC for enterprise & government



LSEC for academia & research institutes


Request information about LSEC Membership

Click here

Sign up for our newsletter

Click here

Learn more about current projects & industry collaborations

Click here

Contact us

Click here


Privacy | Disclaimer | Responsible Disclosure Copyright LSEC - Leaders In Security 2002 - 2017 - Kasteelpark 10, 3001 Heverlee - Leuven | tel. +