Li-Fi has been widely talked about, largely due to its capability to deliver a high data rate wireless connectivity.
Li-FI has some very interesting security characteristics too.
Over the last few weekends I’ve rebuilt my smart home solution. It reminded me of how hard it is to build something that is secure.
A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The vulnerability, dubbed FireStorm, allows an internal entity or malicious code to interact and extract data out of an organisation, completely bypassing the firewall limitation. Continue reading
Network segregation is a common security technique to prevent security issues in one network affecting another. When looking at how information can be moved or shared between such networks the concept of routable protocols, and the opposite non-routable protocols are often used. We also see the term routable / non-routable networks. They are not the same thing, let’s explain…
Over the last year or so, our customers in high assurance environments have been very interested in the concept of “Browse Down”. What does Browse Down mean?
At the back end of 2014, Forbes published a great article “To Stop Data Theft, Let’s Start Disconnecting Computers From The Internet“
The last paragraph says:
Some corporate and government data simply doesn’t belong on the Internet. Why is that so hard to understand?
A good question indeed.
The Internet of things is a hot topic at the moment.