The “3D” National Cyber Security Strategy

The “3D” National Cyber Security Strategy February 2017 In light of the Public Accounts Committee casting a critical eye over the UK’s approach to cyber security last week, I thought it was a good time to reflect on the new National Cyber Security Strategy...

Why do Staff Break Security Rules?

Why do Staff Break Security Rules? June 2014 A recent report by Northumbria University for the Government Office for Science, strongly echoes research we at Nexor conducted in 2009 with Prof. Monica Whitty of the University of Leicester. Our research showed that even...

Booting Linux Securely

Booting Linux Securely February 2014 A report from Learning Tree “Linux Scores Highest in UK Government Security Assessment” has analysed the CESG set of reports on the security of end user devices, in which CESG assessed 11 operating systems. The Learning...

What is the difference between a Guard and a Gateway?

What is the difference between a Guard and a Gateway? August 2013 Guards and gateways are full application layer proxies that connect to two or more networks. They accept data passed on an inbound network interface, ‘process it’, and then pass data to the outbound...