Archive | Information Assurance RSS feed for this section

Cyber Essentials for Home

28 Apr

19 Nov 2015: POST SUPERSEDED BY Cyber Essentials at Home.

Continue reading

An introduction to Information Exchange Gateways

19 Jan

Today marks the beginning of an exciting week for me. I am on site at one of our major clients installing an Information Exchange Gateway demonstrator that I’ve been working on for the last few months. Over that time I’ve seen a growing amount of interest in Information Exchange Gateways (IEGs) from various military organisations, so I decided that it was the right time to start a mini series of blog articles on the topic. Continue reading

The 12 Themes of 2014

17 Dec

Rather than bring you the 12 Days of Christmas, we’ve done the 12 themes of 2014 instead! A look back at what has been making the headlines in the world of Information Security (and beyond) this year. Take a moment to relive the year……  Continue reading

Cyber Threat Glossary – By Example

4 Nov

As more and more people talk about security, I hear the terms threat, vulnerability, mitigation and risk used. Often in what I believe is the wrong context.

There are lots of attempts to define the terms, write taxonomies etc. There is little point in duplicating this, however, here is how I think about the terms…

Continue reading

Why have I got an Intruder Alarm?

28 Oct

At home, I have invested in good quality locks on my doors and windows, conforming to the standard required by my insurance company. In addition to that I have also invested in an intruder alarm.

Continue reading

UK Public Procurement Policy Note 09/14

26 Sep

Now that’s a catchy headline to get your attention! What does it mean, and why blog about it on Cyber Matters?

In short, the policy note published by the Cabinet Office today (Sept 26 2014) says that from October 1st, the Cyber Essentials Scheme is mandatory:

Continue reading

Information Based Security

22 Sep

Last week I attended the IAAC Annual Symposium.  One of the elements of the conference is a poster display where vendors and universities have the opportunity to display their latest research.

Continue reading

The Day the Technology and Entertainment News Headlines Were the Same: Hackers and Nude Celebs

8 Sep

You will no doubt have seen by now the news that naughty photos of celebrities have appeared on the internet.

It’s the story that has everything – cyber security, the dangers of the cloud, online safety and a little bit of smut thrown in for good measure.

Continue reading

Why do Staff Break Security Rules?

26 Jun

A recent report by Northumbria University for the Government Office for Science, strongly echoes research we at Nexor conducted in 2009 with Prof. Monica Whitty of the University of Leicester.
Continue reading

The Cyber Essentials Experience

12 Jun

This month the UK Government Cyber Essentials Scheme was launched.

Nexor committed to gaining Cyber Essentials certification, with Steve Kingan observing:

“I welcome the advent of the Cyber Essentials Scheme and believe it is an important development in improving the supply chain to HMG. Nexor has demonstrated that the Scheme can be straight forward to implement even for an SME. I am pleased that this new mark will become a mandated accreditation for all HMG suppliers of sensitive information technology procurements; and delighted that Nexor has been involved from the start of the Scheme.”

Continue reading