Li-Fi has been widely talked about, largely due to its capability to deliver a high data rate wireless connectivity.
Li-FI has some very interesting security characteristics too.
Over the last few weekends I’ve rebuilt my smart home solution. It reminded me of how hard it is to build something that is secure.
A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The vulnerability, dubbed FireStorm, allows an internal entity or malicious code to interact and extract data out of an organisation, completely bypassing the firewall limitation. Continue reading “Firestorm – how to avoid the latest Next Generation Firewall vulnerability”
In my role as a Solution Architect regular readers of this blog will know that this year I’ve been heavily involved in Information Exchange Gateways. I was recently over in Brussels at the European Defence Agency (EDA) headquarters to deliver a final presentation on the IEG work we have done for them. Possibly the biggest challenge that came up in the meeting was around the flexibility required in enabling secure information exchange. Continue reading “Flexibility should come as standard in Information Exchange Gateways”
Network segregation is a common security technique to prevent security issues in one network affecting another. When looking at how information can be moved or shared between such networks the concept of routable protocols, and the opposite non-routable protocols are often used. We also see the term routable / non-routable networks. They are not the same thing, let’s explain…
Continue reading “Non-Routable Protocols and Networks”
In my last blog post I looked at what Information Exchange Gateways (IEGs) were and why they were so popular at the moment. In this post I will look at how you go about putting together a solution to solve the problem. Continue reading “Building an Information Exchange Gateway”
Over the last year or so, our customers in high assurance environments have been very interested in the concept of “Browse Down”. What does Browse Down mean?
Today marks the beginning of an exciting week for me. I am on site at one of our major clients installing an Information Exchange Gateway demonstrator that I’ve been working on for the last few months. Over that time I’ve seen a growing amount of interest in Information Exchange Gateways (IEGs) from various military organisations, so I decided that it was the right time to start a mini series of blog articles on the topic. Continue reading “An introduction to Information Exchange Gateways”
At the back end of 2014, Forbes published a great article “To Stop Data Theft, Let’s Start Disconnecting Computers From The Internet“
The last paragraph says:
Some corporate and government data simply doesn’t belong on the Internet. Why is that so hard to understand?
A good question indeed.
Continue reading “To Stop Data Theft, Disconnect From The Internet?”
The Internet of things is a hot topic at the moment.