An introduction to Information Exchange Gateways

An introduction to Information Exchange Gateways January 2015 Today marks the beginning of an exciting week for me. I am on site at one of our major clients installing an Information Exchange Gateway demonstrator that I’ve been working on for the last few...

The 12 Themes of 2014

The 12 Themes of 2014 December 2014 Rather than bring you the 12 Days of Christmas, we’ve done the 12 themes of 2014 instead! A look back at what has been making the headlines in the world of Information Security (and beyond) this year. Take a moment to relive...

Why do Staff Break Security Rules?

Why do Staff Break Security Rules? June 2014 A recent report by Northumbria University for the Government Office for Science, strongly echoes research we at Nexor conducted in 2009 with Prof. Monica Whitty of the University of Leicester. Our research showed that even...

The Cyber Essentials Experience

The Cyber Essentials Experience June 2014 This month the UK Government Cyber Essentials Scheme was launched. Nexor committed to gaining Cyber Essentials certification, with Steve Kingan observing: “I welcome the advent of the Cyber Essentials Scheme and believe it is...

Booting Linux Securely

Booting Linux Securely February 2014 A report from Learning Tree “Linux Scores Highest in UK Government Security Assessment” has analysed the CESG set of reports on the security of end user devices, in which CESG assessed 11 operating systems. The Learning...

IISP East Midlands: BIS Organisational Standards

IISP East Midlands: BIS Organisational Standards February 2014 On January 29, we held the second IISP meeting in the East Midlands, at the Institute of Directors in Nottingham, attended by close to 30 delegates. The meeting was opened by Colin Powers with an...