I recently read the book “Advance Persistent Threat: Understanding the Danger and How to Protect your Organization”. The following paragraph in the introductory Chapter really stood out for me:
Continue reading “Countering APT with CyberShield Secure”
In recent weeks we have seen two cyber attacks on banks in the UK, involving physical access to the bank. First Santander, and then Barclays:
Continue reading “Is the Cyber Attack on Barclays a Good Sign?”
In this blog series, I have been exploring applications for Data Diodes. This week, I look at the issue of getting Windows Updates into a segregated network — securely.
Continue reading “Diode Applications: Secure Windows Updates”
In the blog Documents: a Hackers Gateway to your Enterprise I discuss a new approach to reducing the risk of malware embedded in documents, as anti-virus solutions are no longer that effective.
The concepts introduced in the blog are now expanded upon in a Nexor Briefing document Preventing Document-Based Malware from Devastating your Business.
Continue reading “Nexor Merlin – PDF Wizardry in G-Cloud”
Your business, just like Nexor, probably uses documents as a key tool in sharing and disseminating information. As we have known for a very long time now documents can be a source of security infection, but technology does not see to be coping very well in protecting against it – UNTIL NOW.
Continue reading “Documents: a Hackers Gateway to your Enterprise”
In the last few weeks we have seen another round of cyber security hype:
Does this help the cause, identified in the National Security Strategy of increasing the education and awareness of cyber security?
Continue reading “Does Cyber Hype offer Hope”