Our News

Read the latest news from Nexor

Keep up to date with all the latest press releases from Nexor. For all media enquiries please email us.

How Covid-19 infected Information Security

How Covid-19 infected Information Security

On Monday 19th October CIISec Nottingham, Derby, Leicester Branch collaborated with BCS Nottingham Derby to host a virtual event, “How Covid-19 infected Information Security”. The event was well attended by 64 security professionals from both organisations. Prior to...

GuarDiode 3.0 Press Release

GuarDiode 3.0 Press Release

Nexor is pleased to announce GuarDiode 3.0, the latest version of our high assurance information exchange product is now commercially available. Nexor GuarDiode solutions enables our customers to create enforced one-way network connections between systems at the...

Cyber Security Is For Life, Not Just October

Cyber Security Is For Life, Not Just October

October marks European Cybersecurity Month (ECSM) and National Cyber Security Awareness Month (NCSAM). It can serve as a valuable reminder for organisations to evaluate their position in relation to Cyber Security. This blog begins a series of key topics and takeaways...

Insight into the Murky World of Cybercrime

Insight into the Murky World of Cybercrime

On Wednesday 22nd July, Colin Robbins of Nexor, hosted a virtual Masterclass on behalf of the Nottingham, Derby, Leicester Branch of the Chartered Institute of Information Security Professionals on an “Insight into the Murky World of Cybercrime”. The event was well...

Content, Disarm & Reconstruction

Content, Disarm & Reconstruction

What is Content, Disarm and Reconstruction?  Content, Disarm and Reconstruction (CDR) is the act of scanning and removing potentially malicious code from files. It is most often used within your email inbox, to ensure that any files you receive are safe to open. This...

New Cyber Feasibility Report

New Cyber Feasibility Report

This week the CAVShield consortium announced the publication of the project’s reports into the feasibility of detecting and mitigating vulnerabilities and threats to networks of Connected and Automated Vehicles (CAVs). Jointly funded with industry through Zenzic’s...

It Won’t Happen To Us

It Won’t Happen To Us

When talking to board members and senior executives of SMEs about cyber security, a common phrase we hear is “It won’t happen to us”. This is justified by “We are not sufficiently important”, or “We don’t have anything they would want”. “Well, it did”, Ian Major of...

Does Resilience Reflect your Risk?

Does Resilience Reflect your Risk?

Business continuity refers to the activities required to keep an organisation safe and running during an unprecedented event that interrupts normal service. Within the first 3 months of 2020 we have already experienced 2 very real and impactful threats to businesses....

How to Manage a Homebound Workforce

How to Manage a Homebound Workforce

With the introduction of social distancing and uncertainty over what the future holds, businesses are looking to change the way we work more drastically than ever before. However, there is a historical precedent, 355 years ago in 1665, an outbreak of bubonic plague,...

Our New Values & the Future for Nexor

Our New Values & the Future for Nexor

2019 marked Nexor’s 30th year of business, and to commemorate this landmark achievement all employees were treated to a day out at the birthplace of computing. Fun and games aside, management had more in the pipeline to spice up the years to come. For the last 6 years...

RECENT BLOG POSTS

Zero Trust – It’s An Architectural State of Mind

What Is Zero Trust? The term ‘Zero Trust’ was first coined by John Kindervag in 2010, building off a concept put forward by David Lacey at the Jericho Forum, an international group founded in 2004 that worked to promote deperimeterization. Deperimeterization means to...

What Is A Cyber Threat Actor?

You may see the term ‘threat actor’ within risk assessments or other articles - but what is a threat actor? Threat actors are people or entities who are responsible for an incident that impacts the cyber security of another person or organisation. Cyber threat actors...

Office 365 Security & Compliance

  So, you have moved to Office 365. I can imagine that your IT department is rejoicing the fact they will never again have to run ESEUTIL, especially at 2am on a corrupt exchange database - it’s an experience nobody wants. Office 365 offers a secure, resilient,...

Cyber Health Check Quiz

 Archives

Be the first to know about developments in secure information exchange