by Colin Robbins | Nov 10, 2014
Validating the Payload November 2014 In the blog Secure Delivery of a Payload we discussed how secure information exchange consists of two distinct elements: the information you need to convey – the payload, and the technical method used to carry the payload – the...
by Colin Robbins | Oct 21, 2014
Secure Delivery of a Payload via a Protocol Break October 2014 A secure information exchange consists of two distinct elements: the information you need to convey – the payload, and the technical method used to carry the payload – the protocol. Attackers wishing to...
by Colin Robbins | Sep 15, 2014
Diodes are Diodes, Guards are Guards September 2014 Over the last 3-5 years Data Diodes have grown in popularity as a solution for moving data between isolated networks. With this has come creative marketing to leverage the term ‘Diode’ for solutions that...
by Colin Robbins | Nov 12, 2013
Diode Applications: Secure Printing November 2013 In this blog series, I have been exploring applications for Data Diodes. This week, I look at the issue of printing between different networks. Printing is an everyday necessity for businesses. In order for employees...
by Colin Robbins | Oct 10, 2013
Diode Applications: Secure Network Monitoring October 2013 For the third article in the Data Diode blog series, I explore Audit and Monitoring between Domains. Monitoring activity in a network is critical to maintain the availability of systems and reduce the...
by Colin Robbins | Aug 27, 2013
Diode Applications: Secure Windows Updates August 2013 In this blog series, I have been exploring applications for Data Diodes. This week, I look at the issue of getting Windows Updates into a segregated network — securely. It is widely reported that 80% or higher of...