Archive | Secure Information Exchange RSS feed for this section

Li-Fi Security

10 Jan

Li-Fi has been widely talked about, largely due to its capability to deliver a high data rate wireless connectivity.

Li-FI has some very interesting security characteristics too.

Continue reading

S/MIME Re-trial

8 Nov

In the blog S/MIME on Trial in 2013, I outlined some challenges using S/MIME to send secure email.

I also posed the question, was I confident the issues would be solved in a 3-5 year timeframe?

Well, here we are 3 years later, let’s take a look.   Continue reading

Cyber Matters Top 10 posts from 2015

22 Dec

As 2016 approaches, I thought it would be nice to look back on 2015 and share with you the Top 10 most viewed blog posts here on Cyber Matters. Let the countdown begin … Continue reading

Firestorm – how to avoid the latest Next Generation Firewall vulnerability

11 Dec

A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The vulnerability, dubbed FireStorm, allows an internal entity or malicious code to interact and extract data out of an organisation, completely bypassing the firewall limitation. Continue reading

Flexibility should come as standard in Information Exchange Gateways

19 May

In my role as a Solution Architect regular readers of this blog will know that this year I’ve been heavily involved in Information Exchange Gateways. I was recently over in Brussels at the European Defence Agency (EDA) headquarters to deliver a final presentation on the IEG work we have done for them. Possibly the biggest challenge that came up in the meeting was around the flexibility required in enabling secure information exchange. Continue reading

Q: When is a Diode not a Diode?

1 Apr

A: When it’s a Transistor or a Zener diode.

Continue reading

Deploying Information Exchange Gateway solutions

24 Mar

With the current interest in Information Exchange Gateways (IEGs), I wanted to update you on the work that we have been doing with the European Defence Agency over the last year or so. Continue reading

More on Air Gaps

17 Mar

While Air-Gaps are a good conceptual solution, in practice beyond Schneier’s single PC example, they are very hard to achieve. There is nearly always a backdoor to be found somewhere that an attacker can exploit.
Continue reading

Non-Routable Protocols and Networks

10 Mar

Network segregation is a common security technique to prevent security issues in one network affecting another. When looking at how information can be moved or shared between such networks the concept of routable protocols, and the opposite non-routable protocols are often used. We also see the term routable / non-routable networks. They are not the same thing, let’s explain…
Continue reading

Lean Services

5 Mar

Lean Services is a buzz phrase I have been increasingly hearing in secure information exchange circles recently. But what is actually meant by Lean Services? Continue reading