by Jack Akehurst | Sep 29, 2017
File transfers for a data guard: automate or manually review? September 2017 Whilst the global online environment is seeing an increase in cyber threats, companies and government bodies still need to share information, including sensitive intelligence documents, in a...
by Tony Roadknight | Oct 31, 2016
Space: the final frontier for cybersecurity? October 2016 Cyber experts have warned that the world is dangerously unprepared for a global disaster sparked by cyber attacks on space infrastructure. A new report published by Chatham House, an independent policy...
by Colin Robbins | Nov 12, 2013
Diode Applications: Secure Printing November 2013 In this blog series, I have been exploring applications for Data Diodes. This week, I look at the issue of printing between different networks. Printing is an everyday necessity for businesses. In order for employees...
by Colin Robbins | Oct 10, 2013
Diode Applications: Secure Network Monitoring October 2013 For the third article in the Data Diode blog series, I explore Audit and Monitoring between Domains. Monitoring activity in a network is critical to maintain the availability of systems and reduce the...
by Colin Robbins | Aug 27, 2013
Diode Applications: Secure Windows Updates August 2013 In this blog series, I have been exploring applications for Data Diodes. This week, I look at the issue of getting Windows Updates into a segregated network — securely. It is widely reported that 80% or higher of...