The last post: CyberMatters comes to an end

CyberMatters started almost 5 years ago, as a proof of concept blog platform for Nexor. Over that time, we’ve covered a wide range of topics from general security advice on passwords, commentary on topics of the day, and discussion of the latest technology concepts Nexor has been working on.

Over the last few months I’ve focused my efforts on looking at the issues of secure information exchange in the cloud – how can the concepts and architectures Nexor has applied to traditional environments morph and adapt to protecting cloud environments.

The infographic below is a summary of a white paper we’ve released at CYBERUK today discussing our views on how these techniques can be used to enable the Cloud for secure information sharing and exchange.

The Cloud is undoubtedly becoming a core technology we all use – CyberMatters has always run in the cloud using WordPress SaaS! Securing the cloud is becoming a specialist discipline, and I’ve been given the opportunity to build a specialist cloud security team at Nexor.

As part of this, Nexor has been consolidating our branding and web presence. The Qonex brand, built to focus our Cloud and IoT activities, will be rolled back into Nexor as core business, as will CyberMatters.

Consequently, this will be CyberMatter’s last blog post, my future mumblings will be posted on the Nexor blog.

I hope you’ve found the blog of value and interest over the last 5 years, and want to take this opportunity to thank you for your readership, comments, feedback and encouragement. I do hope we’ll meet again at https://www.nexor.com/blog.

Update 2021

The blog refers to a historic site called cybermatters.info.   The current cybermatter.info site is nothing to do with the original developed by me, and is using the content without permission..

Advertisement

The Secure Internet of Things

The Internet of Things (IoT) is big news at the moment, being used as a title for just about everything that interacts with the internet, be it man or machine. In some areas the commentary is just starting to recognise that security and privacy are issues. And as you expect, various players are putting forward their solutions. Continue reading “The Secure Internet of Things”

Booting Linux Securely

A report from Learning Tree “Linux Scores Highest in UK Government Security Assessment” has analysed the CESG set of reports on the security of end user devices, in which CESG assessed 11 operating systems. The Learning Tree report observed:

Of those, Linux got the best overall score

The report then looked at the criteria used to make this assess, and suggested:

As for Secure Boot, that has its serious detractors

Continue reading “Booting Linux Securely”