Author

Noah Mainse

Browsing

Network segregation is a common security technique to prevent security issues in one network affecting another. When looking at how information can be moved or shared between such networks the concept of routable protocols, and the opposite non-routable protocols are often used. We also see the term routable / non-routable networks. They are not the same thing, let’s explain… Routable Protocols The term “routable protocol” is used when the protocol contains the address of the target…

A recent article in the NY Times claims: The vast majority of targeted computer attacks now start with a malicious e-mail sent to a company employee. Now evidence suggests that the same technique could be used to attack watersheds, power grids, oil refineries, and nuclear plants. This cannot be allowed to happen, here I explore the issue in a little more detail. The NY Times is identified the risk as: …all it takes is one click for…

Making an organisation cyber-secure is difficult. As a supplier, demonstrating to an external customer that you are cyber-secure is even more difficult. Conversely, as a customer how can you tell which organisations take it seriously?One approach is to look at adherence or compliance to a security standard. But which one should you look for? IASME, PAS555, ISO27001, ISF Standard for Good Practice, PCI-DSS, adherence to the Ten Steps, or controls to manage the SANS Top…

Bitcoin had a hard time in 2021, is it a viable investment for a cautious digital immigrant? What Is Bitcoin and How Does It Work? One of the current challenges with the system is that as a currency, there are not a huge number of places you can spend your coins. The practicalities are well documented in a number of places, Kashmir Hill is one of a number of people that have documented living on Bitcoin…