HomeCyber Security

Cyber Security

Changing 40+ Passwords: Thanks Heartbleed

Following the Heartbleed revelations, the security advice from the great and good was to change all passwords. To support World Password Day, I changed over 40...

Security and Convenience: Natural Enemies or Strange Bedfellows?

I last blogged about Talk*InfoSec which happened on May 29th. I mentioned that in the panel discussion, two common themes arose: one about companies still...

The Insecurity of the Internet of Things

The Internet of things is a hot topic at the moment. In Securing the Internet of Things Peter Sondergaard of Gartner reports: Securing the Internet of...

UK Government Security Classification Scheme

After nearly two years of planning, the new UK Government Security Classification system comes into operation this month. This will probably be accompanied by...
- Advertisement -

Can you Trust Data Diode?

The Data Diode technical model to achieve a one way network connection is relatively simple. However when you start to consider trust and assurance,...

What does Browse Down mean?

Over the last year or so, our customers in high assurance environments have been very interested in the concept of “Browse Down”. What does...

Ethernet Over Power

In my blog about smart meters, I asked who is looking after the consumer's interest in smart meters. Ethernet over Power adds a new dimension to...

Secure Delivery of a Payload via a Protocol Break

A secure information exchange consists of two distinct elements: the information you need to convey – the payload, and the technical method used to...
- Advertisement -

Is your browser in the Goldilocks zone?

So most corporates will need to make sure their browsers are just right – the Goldilocks zone – not too weak, but not too...

NHS Cyber Attack

The poor and inaccurate reporting of the NHS Ransomware incident over the weekend has irked CyberMatters into coming out of hibernation. With so much...