Archive | Nexor RSS feed for this section

Li-Fi Security

10 Jan

Li-Fi has been widely talked about, largely due to its capability to deliver a high data rate wireless connectivity.

Li-FI has some very interesting security characteristics too.

Continue reading

S/MIME Re-trial

8 Nov

In the blog S/MIME on Trial in 2013, I outlined some challenges using S/MIME to send secure email.

I also posed the question, was I confident the issues would be solved in a 3-5 year timeframe?

Well, here we are 3 years later, let’s take a look.   Continue reading

What can you learn from a Padlock?

22 Jun

In the address bar of THIS blog, you should see a little padlock… Continue reading

Is that Web Site Secure?

7 Jun

To see if a web site is secure, we have been trained to look for the padlock in the browser.  Sadly, not all padlocks are the same  Continue reading

Is your browser in the Goldilocks zone?

19 Apr

If your web browser is too old, you will not be able to access sites using strong security.
If your web browser is too new, it will prevent you accessing sites with weaker security.

So most corporates will need to make sure their browsers are just right – the Goldilocks zone – not too weak, but not too secure. Continue reading

Considerations when Managing IoT Device Keys

15 Mar

As we rapidly advance to the new world of the Internet of Things, security is slowly but surely starting to be talked about. Managing keys is an important part of this discussion.

Continue reading

Q: When will the IoT be secure? A: Never.

16 Feb

That may seem a bit bizarre coming from someone working for a company that specialises in making the IoT secure. Let me justify the comment. Continue reading

Cyber Essentials at UK MOD: the beginning of a critical mass?

10 Feb

The UK’s Cyber Essentials Scheme took a major step forward at the beginning of this year when the UK Ministry of Defence (MOD) mandated that its suppliers need to have obtained a Cyber Essentials certificate before they are able to undertake certain contracts.

This news has been coming for quite a while but judging by some reaction to this mandating of Cyber Essentials, it appears to have caught some by surprise. Continue reading

Christmas Card Competition 2015

17 Dec

At this time of year we have a slight variation on the normal information security theme. Continue reading

Firestorm – how to avoid the latest Next Generation Firewall vulnerability

11 Dec

A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The vulnerability, dubbed FireStorm, allows an internal entity or malicious code to interact and extract data out of an organisation, completely bypassing the firewall limitation. Continue reading