Firestorm – how to avoid the latest Next Generation Firewall vulnerability

A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The vulnerability, dubbed FireStorm, allows an internal entity or malicious code to interact and extract data out of an organisation, completely bypassing the firewall limitation. Continue reading “Firestorm – how to avoid the latest Next Generation Firewall vulnerability”

Advertisement

Flexibility should come as standard in Information Exchange Gateways

In my role as a Solution Architect regular readers of this blog will know that this year I’ve been heavily involved in Information Exchange Gateways. I was recently over in Brussels at the European Defence Agency (EDA) headquarters to deliver a final presentation on the IEG work we have done for them. Possibly the biggest challenge that came up in the meeting was around the flexibility required in enabling secure information exchange. Continue reading “Flexibility should come as standard in Information Exchange Gateways”

Non-Routable Protocols and Networks

Network segregation is a common security technique to prevent security issues in one network affecting another. When looking at how information can be moved or shared between such networks the concept of routable protocols, and the opposite non-routable protocols are often used. We also see the term routable / non-routable networks. They are not the same thing, let’s explain…
Continue reading “Non-Routable Protocols and Networks”

An introduction to Information Exchange Gateways

Today marks the beginning of an exciting week for me. I am on site at one of our major clients installing an Information Exchange Gateway demonstrator that I’ve been working on for the last few months. Over that time I’ve seen a growing amount of interest in Information Exchange Gateways (IEGs) from various military organisations, so I decided that it was the right time to start a mini series of blog articles on the topic. Continue reading “An introduction to Information Exchange Gateways”

To Stop Data Theft, Disconnect From The Internet?

At the back end of 2014, Forbes published a great article “To Stop Data Theft, Let’s Start Disconnecting Computers From The Internet

The last paragraph says:

Some corporate and government data simply doesn’t belong on the Internet. Why is that so hard to understand?

A good question indeed. 
Continue reading “To Stop Data Theft, Disconnect From The Internet?”