The 12 Themes of 2014

The 12 Themes of 2014 December 2014 Rather than bring you the 12 Days of Christmas, we’ve done the 12 themes of 2014 instead! A look back at what has been making the headlines in the world of Information Security (and beyond) this year. Take a moment to relive...

Guards are not Air Gaps

Guards are not Air Gaps December 2014 “An air gap is a network security measure that consists of ensuring that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network.” ...

No, Shellshock does not defeat SELinux

No, Shellshock does not defeat SELinux October 2014 A week is a long time in Cyber Security. These past few weeks you may have heard about the latest ‘big vulnerability’, dubbed ShellShock. If you haven’t, or want more information on it, I direct you...

Building the Guard

Building the Guard February 2014 Okay. We’ve analysed the problem, we’ve produced an excellent design, and we’ve got our security approach nailed down. It’s time to get our hands dirty and actually build it. With a good design in place, one might assume that...

Nexor Directory Guardian

Nexor Directory Guardian January 2014 As readers of this blog will know, NEXOR have recently moved offices. Part of the culture of the new building is a less clutter.  The journey involved opening many cupboards and draws that had not seen the light of day for a long...

Securing the Guard

Securing the Guard January 2014 I have talked previously about the challenge of building a File Guard, and the approach we took to designing it. Because we are building a physical appliance, there is a lot more to design than software – we have to design the whole...