Discussing issues affecting secure information exchange
In this blog, we aim to discuss cyber security issues relating to exchanging information securely and clear up any queries you may have around specific areas.
Thank you for taking the time to read our blog, we hope you enjoy.
Cyber experts have warned that the world is dangerously unprepared for a global disaster sparked by cyber attacks on space infrastructure. This post looks at the threat and what forward-thinking organisations are doing.
I’m getting fed up with marketing that says “Passwords must die” only to present yet another solution that won’t replace them.
In recent times we have once again seen media reports of how military data has been released unintentionally into the public domain. In this post I will be looking at how an email guard might have saved the blushes of the armed forces in question.
Writing code to meet security requirements, so that the end product can withstand various kinds of malicious attack can be very complicated. It is also hard to explain to a non-technical crowd but PAC-MAN can help show the importance of secure code.
Following the announcement of the Trustworthy Software Essentials scheme by the Trustworthy Software Initiative (TSI), Nexor is pleased to announce its full support for the scheme.
As we have just launched a major website upgrade to improve the visitor experience, we thought it would be fun to look back at previous incarnations of www.nexor.com over the last 25 years.
The UK’s Cyber Essentials Scheme took a major step forward at the beginning of this year when the UK Ministry of Defence (MOD) mandated that its suppliers need to have obtained a Cyber Essentials certificate before they are able to undertake certain contracts.
A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet.
Earlier this week it was reported that David Cameron had ordered simulated cyber-attacks on every Whitehall department, to discover if government computers that hold the personal information of millions of people are vulnerable to hackers.
How do you evaluate an Information Exchange Gateway solution? I’ve blogged previously about how Information Exchange Gateways (IEGs) need to be built in a flexible manner to meet a variety of customer requirements.
RECENT BLOG POSTS
Another week, another threat to our Critical National Infrastructure as the “Industroyer” malware was announced last week.
At the recent CSP:2017 conference in York, I helped run a workshop to look at what the barriers to adopting cloud technologies were for sensitive information.
Our animated characters Alice and Bob take a look back at the CYBERUK 2017 event in Liverpool – the “UK Government’s biggest and most influential IA and Cyber Security event to date”.
Be the first to know about developments in secure information exchange