Validating the Payload

Validating the Payload November 2014 In the blog Secure Delivery of a Payload we discussed how secure information exchange consists of two distinct elements: the information you need to convey – the payload, and the technical method used to carry the payload – the...

Secure Delivery of a Payload via a Protocol Break

Secure Delivery of a Payload via a Protocol Break October 2014 A secure information exchange consists of two distinct elements: the information you need to convey – the payload, and the technical method used to carry the payload – the protocol. Attackers wishing to...

Nexor Merlin – PDF Wizardry in G-Cloud

Nexor Merlin – PDF Wizardry in G-Cloud July 2013 In the blog Documents: a Hackers Gateway to your Enterprise I discuss a new approach to reducing the risk of malware embedded in documents, as anti-virus solutions are no longer that effective. The concepts...

Can you be sure a file is what it claims to be?

Can you be sure a file is what it claims to be? July 2013 Content scanning and filtering products are a crucial part of a security ecosystem, validating that files being moved in or out of a network conform to expectation. But how do you determine what is expected, if...