To Stop Data Theft, Disconnect From The Internet?

To Stop Data Theft, Disconnect From The Internet? January 2015 At the back end of 2014, Forbes published a great article “To Stop Data Theft, Let’s Start Disconnecting Computers From The Internet“ The last paragraph says: Some corporate and...

Validating the Payload

Validating the Payload November 2014 In the blog Secure Delivery of a Payload we discussed how secure information exchange consists of two distinct elements: the information you need to convey – the payload, and the technical method used to carry the payload – the...

IISP East Midlands: BIS Organisational Standards

IISP East Midlands: BIS Organisational Standards February 2014 On January 29, we held the second IISP meeting in the East Midlands, at the Institute of Directors in Nottingham, attended by close to 30 delegates. The meeting was opened by Colin Powers with an...

Countering APT with CyberShield Secure

Countering APT with CyberShield Secure October 2013 I recently read the book “Advance Persistent Threat: Understanding the Danger and How to Protect your Organization”. The following paragraph in the introductory Chapter really stood out for me: A product...

Diode Applications: Secure Windows Updates

Diode Applications: Secure Windows Updates August 2013 In this blog series, I have been exploring applications for Data Diodes.  This week, I look at the issue of getting Windows Updates into a segregated network — securely. It is widely reported that 80% or higher of...