Latest News

Keep up to date on the latest events in cyber and information securities from the perspective of individual experts within the field. 

Find by category

The Unseen Spider’s Web of Interconnected Software Dependencies and Cyber Risks

Explore the unseen world of software that powers our daily lives—from morning alarms to complex business systems—in "The Unseen Spider’s Web of Interconnected Software Dependencies and Cyber Risks." Uncover the hidden intricacies and vulnerabilities that can impact everything from personal data to national security. Dive into why robust cybersecurity practices are crucial not just for tech companies but for everyone. Join us in shaping a safer digital future by sharing your thoughts and experiences.

Read more

The Data-Centric Security Interoperability Dilemma

This blog discusses the concept of Data-Centric Security (DCS), focusing on securing data throughout its lifecycle, unlike traditional network-centric approaches. It emphasizes DCS as a strategic solution for organizations like the MOD, NATO, and their allies to ensure data security during transmission across different networks. The core of DCS revolves around controlling, protecting, and sharing data through encrypted metadata, access control, and encryption methods. However, the blog highlights a significant challenge: interoperability. To achieve seamless information sharing, standards for data transformation must be established, which poses difficulties due to the unique data formats used by different systems. The piece concludes by exploring the synergy between Data-Centric Security and Zero Trust architectures, proposing a combined approach to overcome interoperability issues and advocating for integrated security and interoperability standards.

Read more

Not all Single Information Environments are the same

Discover the contrasts between Home Assistant and MOD's Single Information Environment in this insightful blog. From architecture to security, explore the challenges and solutions in home automation and military-grade information environments. Gain expert insights from Nexor's team for optimizing your setup and understanding modern complexities.

Read more

Zero Trust in Three Steps

In the ever-evolving landscape of cyber security, Zero Trust often becomes entangled in technical jargon. For non-technical professionals, especially those in the boardroom, understanding it can be challenging. This article breaks down Zero Trust into three fundamental business-centric steps: verifying input, ensuring trustworthy processes, and demonstrating the reliability of outputs. Discover a pragmatic approach to business that resonates with business operations.

Read more

Categories

Filter