Okay. We’ve analysed the problem, we’ve produced an excellent design, and we’ve got our security approach nailed down. It’s time to get our hands dirty and actually build it.
Continue reading “Building the Guard”
I have talked previously about the nature of the File Guard project, and what makes it a big task. Today, I’d like to share the new approach we took to create the design for that project.
Continue reading “Collaborative Working in Practice”
The purpose of this blog piece is to introduce the concept of threat analysis, what it is and why it’s a good idea, while at the same time present a simple and effective way to try it yourself. It is part of a blog series on the development approach at Nexor.
Continue reading “A Brief Introduction into Threat Analysis”
I recently read the book “Advance Persistent Threat: Understanding the Danger and How to Protect your Organization”. The following paragraph in the introductory Chapter really stood out for me:
Continue reading “Countering APT with CyberShield Secure”
Get Safe Online recently reported the following via twitter:
Linux needs proper installation and configuration to be fully secure ow.ly/bQ76y
— Get Safe Online (@GetSafeOnline) June 27, 2012
This should not be a surprise.
Continue reading “Linux needs proper installation and configuration to be fully secure”