Air Gap Anti-Virus Board BYOD CESG Changing 40+ Passwords Commercial Product Assurance Common Criteria Content Validation Cyber Champions Cyber Essentials CyberShield Secure Data Diode Deploying IEGs GCHQ Get Safe Online Governance Government Policy Guards Heartbleed IEG IISP East Midlands Industrial Control Systems Information Exchange Gateways Internet of Things IoT ISO27001 Malicious Software Network Segregation Nexor Archive Nexor Guardian Nexor Sentinel Passwords Phishing PKI Privacy SCADA Secure Email Security Culture SELinux Smart Home SME Trust Two-factor Authentication Unidirectional Network
Originally posted on A Master’s Swimming Blog:
Due to logistical reasons I could not swim on Thursday, but I managed to book a swim tonight. It was great to swim with three others all doing the same set and working together. It made such a difference. Work was also different and so long today.…
(Blog first appeared on nexor.com) Automated security tools can be a very effective security tool, but there are pitfalls for the unwary. I will use a couple of well-known maths puzzles to illustrate why these pitfalls exist. 1 = 2 Most 16 year old maths students will be able to provide a convincing proof that … Continue reading Re-blog: Using Maths to Show that Automated Security Tools do not Provide Security →
Reblog. Original (Nexor.com) High Assurance products are needed where information or networks need to be protected from high end threat actors, and you need a high level of confidence that the solution will mitigate the risk. Continue reading High Assurance Cyber Security →
Reblog. Original (Nexor.com) For the last few years, the cyber security commentary has been if you focus on the basics, and do the basics well, you will prevent 90% plus of cyber security attacks. To many this has been interpreted as doing the “Cyber Essentials”. Then the SolarWinds / Sunburst attack occurred. Doing Cyber Essentials … Continue reading Re-blog: The King is Dead →
Reblog. Original (Nexor.com) A CISO – Chief Information Security Officer – at an SME is responsible for security operations, securing the business, its technology, and its initiatives, and leading the business’s information security strategy. A CISO must liaise with different areas of the business including IT, HR, and C-level executives to ensure that their objectives … Continue reading Re-blog: A Day in the Life of a CISO →
Cyber Security Marketing – Please read your own messages? I just received a marketing email entitled “Your Complete Guide to Phishing”. Interesting. All I had to do to get the guide was… Click on a link (from the unknown source) Provide my name and email address Oh the Irony. “Learn how not to click links … Continue reading Phishing Irony →
When looking at commercial or consumer products how often do you seen the phrase “military grade security”, very often as the only nod to the security of the product? Don’t buy it!
Reblog. Original (Nexor.com) What Is Zero Trust? The term ‘Zero Trust’ was first coined by John Kindervag in 2010, building off a concept put forward by David Lacey at the Jericho Forum, an international group founded in 2004 that worked to promote deperimeterization. Deperimeterization means to “protect an organisation’s systems and data on multiple levels, by … Continue reading Re-blog: Zero-Trust – IT’s an Architectural State of Mind →
Like many, during lockdown I’ve been catching up on a number of Webinars. It’s given me the opportunity to do some catch up in the Identity Management field. During the EEMA annual conference, a distinguished speaker observed “We are in danger of re-inventing the wheel, without learning from the past”, which caused me to reflect … Continue reading New Identity – Old Problem →
The continuing Covid-19 house clearout led to me finding a pile of business cards… The first card, from 1990. An X.400 email address, did anyone every think that would really catch on? Looks like we ran our own PRMD, unusual for a small business. I wonder why our current meeting room is called the Enterprise? … Continue reading Covid-19 Clearout: Business Cards →
This month marks 20 years since the ILOVEYOU virus hit computer networks. For me, it represented a milestone in my security career. Up until that point security was a technical challenge, solving challenges associate with the global distribution of public keys for secure email exchange. (Aside, I’ve blogged on this many times, it is a … Continue reading ILOVEYOU – 20 Years On →
Reblog. Original (TechUK) 90% of security attacks start with a phishing attempt. This is because attackers want to get hold of your password. Once they have obtained this, they can become you, and access wherever you can access. More…
Lockdown 2020 – I took the opportunity to learn Python. Wow, developers of today have it so easy!
The COVID-19 app is being trailed in the Isle of Wight, and has already created lots of public debate. The debate centres around security and privacy. However, there is part of security that has so far not been aired – false positives. Before I discuss false positives, I want to spend a few paragraphs on … Continue reading Security, Privacy and False Positives in the Covid-19 App →
Reblog. Original (Nexor.com) When talking to board members and senior executives of SMEs about cyber security, a common phrase we hear is “It won’t happen to us”. This is justified by “We are not sufficiently important”, or “We don’t have anything they would want”. “Well, it did”, Ian Major of… More…
Reblog. Original (TechUK) By now, we must all be aware that Cyber Security is a prominent issue – we recently heard mainstream news reports about Ransomware hitting the NHS and often hear about the latest data theft of millions of passwords or credit cards.…Home users should be starting to get the message about keeping our … Continue reading Reblog: How Do You Remain Savvy With Your Supply Chain →
Reblog: (original Nexor.com) On Wednesday 2nd October, the IISP East Midlands ran its third quarterly meeting kindly hosted by the East Midlands Special Operations Unit (EMSOU). Over 20 security professionals joined to collaborate and explore the latest news surrounding the incident response cycle, covering both what has worked well and learning points from real life … Continue reading IISP East Midlands →
CyberMatters started almost 5 years ago, as a proof of concept blog platform for Nexor. Over that time, we’ve covered a wide range of topics from general security advice on passwords, commentary on topics of the day, and discussion of the latest technology concepts Nexor has been working on. Over the last few months I’ve … Continue reading The last post: CyberMatters comes to an end →
Something went wrong. Please refresh the page and/or try again.