Reblog. Original (Nexor.com) High Assurance products are needed where information or networks need to be protected from high end threat actors, and you need a high level of confidence that the solution will mitigate the risk. Continue reading High Assurance Cyber Security →
Reblog. Original (Nexor.com) For the last few years, the cyber security commentary has been if you focus on the basics, and do the basics well, you will prevent 90% plus of cyber security attacks. To many this has been interpreted as doing the “Cyber Essentials”. Then the SolarWinds / Sunburst attack occurred. Doing Cyber Essentials … Continue reading Re-blog: The King is Dead →
Reblog. Original (Nexor.com) A CISO – Chief Information Security Officer – at an SME is responsible for security operations, securing the business, its technology, and its initiatives, and leading the business’s information security strategy. A CISO must liaise with different areas of the business including IT, HR, and C-level executives to ensure that their objectives … Continue reading Re-blog: A Day in the Life of a CISO →
Cyber Security Marketing – Please read your own messages? I just received a marketing email entitled “Your Complete Guide to Phishing”. Interesting. All I had to do to get the guide was… Click on a link (from the unknown source) Provide my name and email address Oh the Irony. “Learn how not to click links … Continue reading Phishing Irony →
When looking at commercial or consumer products how often do you seen the phrase “military grade security”, very often as the only nod to the security of the product? Don’t buy it!
Reblog. Original (Nexor.com) What Is Zero Trust? The term ‘Zero Trust’ was first coined by John Kindervag in 2010, building off a concept put forward by David Lacey at the Jericho Forum, an international group founded in 2004 that worked to promote deperimeterization. Deperimeterization means to “protect an organisation’s systems and data on multiple levels, by … Continue reading Re-blog: Zero-Trust – IT’s an Architectural State of Mind →
Like many, during lockdown I’ve been catching up on a number of Webinars. It’s given me the opportunity to do some catch up in the Identity Management field. During the EEMA annual conference, a distinguished speaker observed “We are in danger of re-inventing the wheel, without learning from the past”, which caused me to reflect … Continue reading New Identity – Old Problem →
The continuing Covid-19 house clearout led to me finding a pile of business cards… The first card, from 1990. An X.400 email address, did anyone every think that would really catch on? Looks like we ran our own PRMD, unusual for a small business. I wonder why our current meeting room is called the Enterprise? … Continue reading Covid-19 Clearout: Business Cards →
This month marks 20 years since the ILOVEYOU virus hit computer networks. For me, it represented a milestone in my security career. Up until that point security was a technical challenge, solving challenges associate with the global distribution of public keys for secure email exchange. (Aside, I’ve blogged on this many times, it is a … Continue reading ILOVEYOU – 20 Years On →
Reblog. Original (TechUK) 90% of security attacks start with a phishing attempt. This is because attackers want to get hold of your password. Once they have obtained this, they can become you, and access wherever you can access. More…
Lockdown 2020 – I took the opportunity to learn Python. Wow, developers of today have it so easy!
The COVID-19 app is being trailed in the Isle of Wight, and has already created lots of public debate. The debate centres around security and privacy. However, there is part of security that has so far not been aired – false positives. Before I discuss false positives, I want to spend a few paragraphs on … Continue reading Security, Privacy and False Positives in the Covid-19 App →
Reblog. Original (Nexor.com) When talking to board members and senior executives of SMEs about cyber security, a common phrase we hear is “It won’t happen to us”. This is justified by “We are not sufficiently important”, or “We don’t have anything they would want”. “Well, it did”, Ian Major of… More…
Reblog. Original (TechUK) By now, we must all be aware that Cyber Security is a prominent issue – we recently heard mainstream news reports about Ransomware hitting the NHS and often hear about the latest data theft of millions of passwords or credit cards.…Home users should be starting to get the message about keeping our … Continue reading Reblog: How Do You Remain Savvy With Your Supply Chain →
Reblog: (original Nexor.com) On Wednesday 2nd October, the IISP East Midlands ran its third quarterly meeting kindly hosted by the East Midlands Special Operations Unit (EMSOU). Over 20 security professionals joined to collaborate and explore the latest news surrounding the incident response cycle, covering both what has worked well and learning points from real life … Continue reading IISP East Midlands →
CyberMatters started almost 5 years ago, as a proof of concept blog platform for Nexor. Over that time, we’ve covered a wide range of topics from general security advice on passwords, commentary on topics of the day, and discussion of the latest technology concepts Nexor has been working on. Over the last few months I’ve … Continue reading The last post: CyberMatters comes to an end →
The poor and inaccurate reporting of the NHS Ransomware incident over the weekend has irked CyberMatters into coming out of hibernation. With so much to say, it’s hard to know where to start. Not targeted First the NHS was not targeted by a Cyber Attack. The attack affected ANY system that was vulnerable; the sad … Continue reading The “NHS” Attack →
PKI is a technology that has stood the test of time, but it is let down by high running costs and poor implementation.
Something went wrong. Please refresh the page and/or try again.