Welcome to the May 2016 edition
Next week we will be exhibiting at the CESG event ‘CyberUK in Practice’ and in a few weeks’ time we will be presenting at the UK Crypto Developers Forum’ Annual Technology Day.
In our blog, we take a look at how the 1980’s video game sensation, PAC-MAN, demonstrates to the non-technical the importance of writing secure code.
Finally, our white paper on industrial control systems tackles the air-gaps, firewalls or data diodes debate.
Thanks for reading.
Steve Kingan, Chairman
Nexor exhibiting at CESG event
We shall be exhibiting at CESG’s ‘CyberUK in Practice’ event in Liverpool, UK next week (24-25th May).
The event is being billed as the UK Government’s biggest ever cyber event and will bring together colleagues across the public sector, CNI, industry and academia.
Nexor’s Managing Director, Andrew Kays, and Lead Technologist, Tony Roadknight, will be amongst the attendees. Feel free to call into the Nexor stand at A22 in the main hall.
PAC-MAN shows the importance of secure coding
As you will be aware, secure coding is vitally important for any cyber security solution.
In our blog, with the help of the 1980’s video game sensation, PAC-MAN, one of our technical consultants explains how insecure coding can lead to problems.
The article also outlines our CyberShield Secure approach to ensuring that our code is secure.
Presenting at UK 'Crypto Developers Forum’ Annual Technology Day
Nexor is part of a trade association called the UK ‘Crypto Developers Forum’ (UKCDF) and we have been invited to present at their annual technology day next month.
The event theme is around “Implementing & assuring security to mitigate safety & security risks & liabilities” and we will be presenting on the “Benefits of a High Assurance approach”.
Air Gaps, Firewalls and Data Diodes in Industrial Control Systems
Businesses have a real, and ongoing, requirement to extract business information from Industrial Control Systems for crucially important management purposes.
Our white paper looks at what the best ways to secure industrial control systems are. It considers the merits and drawbacks of a variety of technologies on the market.
Be the first to know about developments in secure information exchange