What Is A Security Audit?

Implementing good cyber security involves more than just implementing technology. You need appropriate supporting policies/processes and well-trained staff to follow them. This typically all comes together in what is referred to as a Security Management System. To be...

Cyber Essentials – Where To Begin?

What Is Cyber Essentials? Cyber Essentials is a government-backed scheme, operated by the National Cyber Security Centre. The scheme highlights the baseline of good security practice and helps to teach businesses how to protect themselves from online threats. There...

Dynamic Risk Management – The Path Less Trodden…

Dynamic Risk Management – The Path Less Trodden… March 2018 Traditionally, our approach to managing cyber security risks has been ‘static’ – in the sense that the threat analysis, risk assessment and treatment plan are performed as manual operations ‘up front’ of...

How PAC-MAN shows the importance of secure coding

How PAC-MAN shows the importance of secure coding May 2016 At Nexor, we provide solutions to customers where security is critical. To meet our customers’ needs, it is essential to make sure the code we write meets basic security requirements, so that the end product...

Building the Guard

Building the Guard February 2014 Okay. We’ve analysed the problem, we’ve produced an excellent design, and we’ve got our security approach nailed down. It’s time to get our hands dirty and actually build it. With a good design in place, one might assume that...