by Jack Akehurst | Sep 29, 2017
File transfers for a data guard: automate or manually review? September 2017 Whilst the global online environment is seeing an increase in cyber threats, companies and government bodies still need to share information, including sensitive intelligence documents, in a...
by Martin Cooper | Aug 9, 2017
PANDORA: The single cable to desktop challenge August 2017 PANDORA is a concept demonstrator programme undertaken by the UK Ministry of Defence, as part of the C4ISR Secure Information Infrastructure and Services (CSIIS) research programme, to remove the risk from...
by Tony Roadknight | Jul 29, 2016
Why email guards can help prevent data breaches July 2016 In recent times we have once again seen media reports of how military data has been released unintentionally into the public domain. In this post I will be looking at how an email guard might have saved the...
by Martin Cooper | Dec 11, 2015
Firestorm – how to avoid the latest Next Generation Firewall vulnerability December 2015 A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The vulnerability, dubbed FireStorm,...
by Martin Cooper | Mar 24, 2015
Deploying Information Exchange Gateway solutions March 2015 With the current interest in Information Exchange Gateways (IEGs), I wanted to update you on the work that we have been doing with the European Defence Agency over the last year or so. In the previous two...