by Colin Robbins | Nov 25, 2020
What Is Zero Trust? The term ‘Zero Trust’ was first coined by John Kindervag in 2010, building off a concept put forward by David Lacey at the Jericho Forum, an international group founded in 2004 that worked to promote deperimeterization. Deperimeterization means to...
by Iain Townsend | Mar 29, 2018
Dynamic Risk Management – The Path Less Trodden… March 2018 Traditionally, our approach to managing cyber security risks has been ‘static’ – in the sense that the threat analysis, risk assessment and treatment plan are performed as manual operations ‘up front’ of...
by Martin Cooper | Aug 9, 2017
PANDORA: The single cable to desktop challenge August 2017 PANDORA is a concept demonstrator programme undertaken by the UK Ministry of Defence, as part of the C4ISR Secure Information Infrastructure and Services (CSIIS) research programme, to remove the risk from...
by Colin Robbins | Mar 2, 2017
Why AWS wasn’t the real point of failure March 2017 So, Amazon Web Services went AWOL this week, leaving many websites inoperable. In the currently climate of fake and inaccurate news, it is important to read beyond the headline to realise that “AWS” did not go...
by Tony Roadknight | Dec 19, 2016
Japanese Defence Ministry Hack Shows No Network Is Safe December 2016 Although Japanese government officials have since denied the reports, it seems that a secure network used by the country’s defence forces was breached earlier this year. The Defence Ministry...
by Colin Robbins | Aug 18, 2016
We cannot let passwords die (yet) August 2016 I’m getting fed up with marketing that says “Passwords must die” only to present yet another solution that won’t replace them. The challenge to solve is ubiquity – this is why passwords have stood the test of time, even...