Tag Archives: Network Segregation

Li-Fi Security

10 Jan

Li-Fi has been widely talked about, largely due to its capability to deliver a high data rate wireless connectivity.

Li-FI has some very interesting security characteristics too.

Continue reading

Smart Home Project – Network Segregation

15 Nov

Over the last few weekends I’ve rebuilt my smart home solution. It reminded me of how hard it is to build something that is secure.

Continue reading

Firestorm – how to avoid the latest Next Generation Firewall vulnerability

11 Dec

A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The vulnerability, dubbed FireStorm, allows an internal entity or malicious code to interact and extract data out of an organisation, completely bypassing the firewall limitation. Continue reading

Flexibility should come as standard in Information Exchange Gateways

19 May

In my role as a Solution Architect regular readers of this blog will know that this year I’ve been heavily involved in Information Exchange Gateways. I was recently over in Brussels at the European Defence Agency (EDA) headquarters to deliver a final presentation on the IEG work we have done for them. Possibly the biggest challenge that came up in the meeting was around the flexibility required in enabling secure information exchange. Continue reading

Non-Routable Protocols and Networks

10 Mar

Network segregation is a common security technique to prevent security issues in one network affecting another. When looking at how information can be moved or shared between such networks the concept of routable protocols, and the opposite non-routable protocols are often used. We also see the term routable / non-routable networks. They are not the same thing, let’s explain…
Continue reading

Building an Information Exchange Gateway

10 Feb

In my last blog post I looked at what Information Exchange Gateways (IEGs) were and why they were so popular at the moment. In this post I will look at how you go about putting together a solution to solve the problem. Continue reading

Browse Down

27 Jan

Over the last year or so, our customers in high assurance environments have been very interested in the concept of “Browse Down”. What does Browse Down mean?

Continue reading

An introduction to Information Exchange Gateways

19 Jan

Today marks the beginning of an exciting week for me. I am on site at one of our major clients installing an Information Exchange Gateway demonstrator that I’ve been working on for the last few months. Over that time I’ve seen a growing amount of interest in Information Exchange Gateways (IEGs) from various military organisations, so I decided that it was the right time to start a mini series of blog articles on the topic. Continue reading

To Stop Data Theft, Disconnect From The Internet?

13 Jan

At the back end of 2014, Forbes published a great article “To Stop Data Theft, Let’s Start Disconnecting Computers From The Internet

The last paragraph says:

Some corporate and government data simply doesn’t belong on the Internet. Why is that so hard to understand?

A good question indeed. 
Continue reading

The Insecurity of the Internet of Things

25 Nov

The Internet of things is a hot topic at the moment.

Continue reading