Validating the Payload

Validating the Payload November 2014 In the blog Secure Delivery of a Payload we discussed how secure information exchange consists of two distinct elements: the information you need to convey – the payload, and the technical method used to carry the payload – the...

Secure Delivery of a Payload via a Protocol Break

Secure Delivery of a Payload via a Protocol Break October 2014 A secure information exchange consists of two distinct elements: the information you need to convey – the payload, and the technical method used to carry the payload – the protocol. Attackers wishing to...

Diodes are Diodes, Guards are Guards

Diodes are Diodes, Guards are Guards September 2014 Over the last 3-5 years Data Diodes have grown in popularity as a solution for moving data between isolated networks. With this has come creative marketing to leverage the term ‘Diode’ for solutions that...

Diode Applications: Secure Printing

Diode Applications: Secure Printing November 2013 In this blog series, I have been exploring applications for Data Diodes.  This week, I look at the issue of printing between different networks. Printing is an everyday necessity for businesses. In order for employees...

Diode Applications: Secure Network Monitoring

Diode Applications: Secure Network Monitoring October 2013 For the third article in the Data Diode blog series, I explore Audit and Monitoring between Domains. Monitoring activity in a network is critical to maintain the availability of systems and reduce the...

Diode Applications: Secure Windows Updates

Diode Applications: Secure Windows Updates August 2013 In this blog series, I have been exploring applications for Data Diodes.  This week, I look at the issue of getting Windows Updates into a segregated network — securely. It is widely reported that 80% or higher of...