Discussing issues affecting secure information exchange
In this blog, we aim to discuss cyber security issues relating to exchanging information securely and clear up any queries you may have around specific areas.
Thank you for taking the time to read our blog, we hope you enjoy.
In my role as a Solution Architect regular, readers of this blog will know that this year I’ve been heavily involved in Information Exchange Gateways. I was recently over in Brussels at the European Defence Agency (EDA) headquarters to deliver a final presentation on the IEG work we have done for them.
A: When it’s a Transistor or a Zener diode.
With the current interest in Information Exchange Gateways (IEGs), I wanted to update you on the work that we have been doing with the European Defence Agency over the last year or so.
While Air-Gaps are a good conceptual solution, in practice beyond Schneier’s single PC example, they are very hard to achieve. There is nearly always a backdoor to be found somewhere that an attacker can exploit.
Network segregation is a common security technique to prevent security issues in one network affecting another. When looking at how information can be moved or shared between such networks the concept of routable protocols, and the opposite non-routable protocols are often used.
Lean Services is a buzz phrase I have been increasingly hearing in secure information exchange circles recently. But what is actually meant by Lean Services?
In my last blog post I looked at what Information Exchange Gateways (IEGs) were and why they were so popular at the moment. In this post I will look at how you go about putting together a solution to solve the problem.
Over the last year or so, our customers in high assurance environments have been very interested in the concept of “Browse Down”. What does Browse Down mean?
Today marks the beginning of an exciting week for me. I am on site at one of our major clients installing an Information Exchange Gateway demonstrator that I’ve been working on for the last few months.
At the back end of 2014, Forbes published a great article “To Stop Data Theft, Let’s Start Disconnecting Computers From The Internet”
RECENT BLOG POSTS
The post reflects on the new UK National Cyber Security Strategy, since its launch three months ago. Outlining its main objectives – Defend, Deter, Develop.
Although Japanese government officials have since denied the reports, it seems that a secure network used by the country’s defence forces was breached earlier this year.
It’s a popular misconception that baby boomers aged 52 to 70 in 2016 are generally less tech savvy and more naïve online than their younger millennial counterparts aged 19 to 35. Find out why…
Be the first to know about developments in secure information exchange