Latest News
Keep up to date on the latest events in cyber and information securities from the perspective of individual experts within the field.
Keep up to date on the latest events in cyber and information securities from the perspective of individual experts within the field.
In this article, we discuss the pros and cons of a cross domain gateway, and the benefits of transitioning to a new approach – software defined gateways.
Read moreExplore communication challenges from rural connectivity to offshore experiences. The text delves into ongoing struggles in secure information exchange during emergencies (DDIL), proposing practical strategies like prioritizing messages, utilizing diverse channels, and adopting military-inspired labelling.
Read moreStandards are a good thing, but not all standards are good. To achieve interoperability, the communicating systems either needs to agree on a common format for data exchange, or a gateway needs to be deployed to convert from one formation to another. So, at a base level, standards are good – they enable you to agree a common format for data exchange.
Read moreZero Trust is a complex topic, involving the determination of what is being trusted and how that trust is asserted. However, how do you scope the boundary of where your trust assessment goes?
Read moreThis blog explores interoperability and the additional challenges experienced when trying to achieve interoperability in a secure manner.
Read moreThis blog offers a personal viewpoint, drawing on 30 years of frustration with S/MIME. It underscores the challenges that current research needs to navigate in order to unlock the desired benefits of this approach for DCS.
Read moreZero trust is not a magic black box product either. Those that know me are aware that I’m very much a “let’s go back to first principles” kind of person, and often that has saved me from going down rabbit holes, or has found overlooked flaws in previous enterprise architectures and highlighted a clearer path to success.
Read more