Our News
Read the latest news from Nexor
Keep up to date with all the latest press releases from Nexor. For all media enquiries please email us.
Joint Supply Chain Accreditation Register (JOSCAR)
Nexor has retained level 2 status in the Joint Supply Chain Accreditation Register (JOSCAR), a database of firms that have undergone accreditation to prove they have the systems in place to supply to the aerospace, defence and security industry. The JOSCAR...
Employees are our First Line of Defence
Information Security is at a crossroads; we have more and more tools available to mitigate attacks but the number of security incidents such as data breaches is on the rise - why is this? Everyone thinks they know what they should be doing when it comes to information...
What is Servant Leadership?
Going through Scrum Master training gave me one of the greatest leadership tools I’ve ever received, one that I use on a daily basis within my role as a Product Manager, but also as a leader in my organisation and in the wider community. It's a mindset that's called...
Certifications & Skills in Cyber Security Recruitment
Are We Looking for Unicorns Are we looking for realistic combinations of skills and certifications in cyber security recruitment, or are we looking for mythical candidates who, like unicorns, simply don't exist? That was the question posed on Monday 8th February,...
Automated Security Tools can miss the bigger picture
Using Maths to Show that Automated Security Tools do not Provide Security Automated security tools can be a very effective security tool, but there are pitfalls for the unwary. I will use a couple of well-known maths puzzles to illustrate why these pitfalls exist. 1 =...
Risk Assessments – A Cats Tale
Risk Assessments, Cat Flaps and Ransomware One of the most common activities undertaken as a Security Consultant at Nexor is talking to clients about risk management and risk assessments. There are many different methodologies that can be used to determine risk, but...
Safe File Transfers & the Reserve Bank of New Zealand Cyber Attack
The Risks of Cyber Cat Flaps So here we are in January 2021, and the significant hacks are already being reported, picking up where 2020 left off. While the cyber industry is still managing the fallout of SolarWinds, Google has announced (with few details of the...
How Covid-19 infected Information Security
On Monday 19th October CIISec Nottingham, Derby, Leicester Branch collaborated with BCS Nottingham Derby to host a virtual event, “How Covid-19 infected Information Security”. The event was well attended by 64 security professionals from both organisations. Prior to...
GuarDiode 3.0 Press Release
Nexor is pleased to announce GuarDiode 3.0, the latest version of our high assurance information exchange product is now commercially available. Nexor GuarDiode solutions enables our customers to create enforced one-way network connections between systems at the...
Cyber Security Is For Life, Not Just October
October marks European Cybersecurity Month (ECSM) and National Cyber Security Awareness Month (NCSAM). It can serve as a valuable reminder for organisations to evaluate their position in relation to Cyber Security. This blog begins a series of key topics and takeaways...
RECENT BLOG POSTS
Press Release – Guardian 3.1 – High Availability
Nexor are pleased to announce that our Guardian solution has been enhanced with a number of key features in a new release 3.1 of the guard application which is now available: Increased Reliability: Deploy as an active -passive High-Availability ("HA") application...
Making Effective Use Of Zero Trust Security
One year on from our introductory blog on Zero Trust Architecture, what has changed and what friction points have started to appear for organisations after implementation? Crucially, where does Zero Trust fit within the to-do list, or the essential security risk...
Cyber Essentials – Under The Bonnet
What does Cyber Essentials cover? Cyber Essentials is a UK Government backed scheme that helps protect your business against a range of the most common cyber-attacks. Cyber-attacks can come in many forms and may be carried out against businesses of any size of...
Be the first to know about developments in secure information exchange