Thank you for visiting Cyber Matters. In this blog we aim to discuss issues relating to cyber security, with brief articles, that don’t get carried away with too much technical detail.
We operate in an industry in which there is a lot of over hyped nonsense discussed, as well as some really important issues. In Cyber Matters we aim to cut through this and get straight to the point in an easy to understand way. Our bloggers are free to talk about any area relating to Cyber Security, Computer Security, Information Security or what ever term you prefer to use.
We welcome your views – please contribute to the discussion by way of comments on our articles.
- Li-Fi Security
- Out of Office Dilemma
- Payment Services Directive
- Smart Home Project – HomeKit and LightwaveRF Integration
- We cannot let passwords die (yet) - I’m getting fed up with marketing that says “Passwords must die” only to present yet another solution that won’t replace them. The challenge to solve is ubiquity – this is why passwords have stood the test of time, even with their obvious and proven shortcomings.
- What can you learn from a Padlock? - In the address bar of THIS blog, you should see a little padlock…
- Considerations when Managing IoT Device Keys - As we rapidly advance to the new world of the Internet of Things, security is slowly but surely starting to be talked about. Managing keys is an important part of this discussion.
- Q: When will the IoT be secure? A: Never. - That may seem a bit bizarre coming from someone working for a company that specialises in making the IoT secure. Let me justify the comment.
- The Secure Internet of Things - The Internet of Things (IoT) is big news at the moment, being used as a title for just about everything that interacts with the internet, be it man or machine. In some areas the commentary is just starting to recognise that security and privacy are issues. And as you expect, various players are putting forward […]
- Booting Linux Securely - A report from Learning Tree “Linux Scores Highest in UK Government Security Assessment” has analysed the CESG set of reports on the security of end user devices, in which CESG assessed 11 operating systems. The Learning Tree report observed: Of those, Linux got the best overall score The report then looked at the criteria used to […]