Li-Fi has been widely talked about, largely due to its capability to deliver a high data rate wireless connectivity.
Li-FI has some very interesting security characteristics too.
In the address bar of THIS blog, you should see a little padlock… Continue reading
To see if a web site is secure, we have been trained to look for the padlock in the browser. Sadly, not all padlocks are the same… Continue reading
If your web browser is too old, you will not be able to access sites using strong security.
If your web browser is too new, it will prevent you accessing sites with weaker security.
So most corporates will need to make sure their browsers are just right – the Goldilocks zone – not too weak, but not too secure. Continue reading
As we rapidly advance to the new world of the Internet of Things, security is slowly but surely starting to be talked about. Managing keys is an important part of this discussion.
That may seem a bit bizarre coming from someone working for a company that specialises in making the IoT secure. Let me justify the comment. Continue reading
The UK’s Cyber Essentials Scheme took a major step forward at the beginning of this year when the UK Ministry of Defence (MOD) mandated that its suppliers need to have obtained a Cyber Essentials certificate before they are able to undertake certain contracts.
This news has been coming for quite a while but judging by some reaction to this mandating of Cyber Essentials, it appears to have caught some by surprise. Continue reading
At this time of year we have a slight variation on the normal information security theme. Continue reading
A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The vulnerability, dubbed FireStorm, allows an internal entity or malicious code to interact and extract data out of an organisation, completely bypassing the firewall limitation. Continue reading