by Kevin Spencer | Dec 17, 2014
The 12 Themes of 2014 December 2014 Rather than bring you the 12 Days of Christmas, we’ve done the 12 themes of 2014 instead! A look back at what has been making the headlines in the world of Information Security (and beyond) this year. Take a moment to relive...
by Colin Robbins | Dec 9, 2014
Guards are not Air Gaps December 2014 “An air gap is a network security measure that consists of ensuring that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network.” (Wikipedia) Note...
by Colin Robbins | Oct 9, 2014
No, Shellshock does not defeat SELinux October 2014 A week is a long time in Cyber Security. These past few weeks you may have heard about the latest ‘big vulnerability’, dubbed ShellShock. If you haven’t, or want more information on it, I direct you...
by Colin Robbins | Feb 25, 2014
Building the Guard February 2014 Okay. We’ve analysed the problem, we’ve produced an excellent design, and we’ve got our security approach nailed down. It’s time to get our hands dirty and actually build it. With a good design in place, one might assume that...
by Colin Robbins | Jan 21, 2014
Nexor Directory Guardian January 2014 As readers of this blog will know, NEXOR have recently moved offices. Part of the culture of the new building is a less clutter. The journey involved opening many cupboards and draws that had not seen the light of day for a long...
by Colin Robbins | Jan 7, 2014
Securing the Guard January 2014 I have talked previously about the challenge of building a File Guard, and the approach we took to designing it. Because we are building a physical appliance, there is a lot more to design than software – we have to design the whole...