by Jack Akehurst | Sep 29, 2017
File transfers for a data guard: automate or manually review? September 2017 Whilst the global online environment is seeing an increase in cyber threats, companies and government bodies still need to share information, including sensitive intelligence documents, in a...
by Tony Roadknight | Jun 22, 2017
Industroyer: yet another wake-up call for industrial control system security? June 2017 Another week, another threat to our Critical National Infrastructure as the “Industroyer” malware was announced last week. This latest piece of malware is alleged to be able to...
by Tony Roadknight | Dec 19, 2016
Japanese Defence Ministry Hack Shows No Network Is Safe December 2016 Although Japanese government officials have since denied the reports, it seems that a secure network used by the country’s defence forces was breached earlier this year. The Defence Ministry...
by Tony Roadknight | Oct 31, 2016
Space: the final frontier for cybersecurity? October 2016 Cyber experts have warned that the world is dangerously unprepared for a global disaster sparked by cyber attacks on space infrastructure. A new report published by Chatham House, an independent policy...
by Colin Robbins | Mar 17, 2015
MORE ON AIR GAPS March 2015 While Air-Gaps are a good conceptual solution, in practice beyond Schneier’s single PC example, they are very hard to achieve. There is nearly always a backdoor to be found somewhere that an attacker can exploit. Opinion is divided,...