by Jack Akehurst | Sep 29, 2017
File transfers for a data guard: automate or manually review? September 2017 Whilst the global online environment is seeing an increase in cyber threats, companies and government bodies still need to share information, including sensitive intelligence documents, in a...
by Colin Robbins | Jan 7, 2014
Securing the Guard January 2014 I have talked previously about the challenge of building a File Guard, and the approach we took to designing it. Because we are building a physical appliance, there is a lot more to design than software – we have to design the whole...
by Colin Robbins | Dec 17, 2013
Collaborative Working in Practice December 2013 I have talked previously about the nature of the File Guard project, and what makes it a big task. Today, I’d like to share the new approach we took to create the design for that project. File Guard is a project with a...
by Keith Robinson | Dec 3, 2013
A Brief Introduction into Threat Analysis December 2013 The purpose of this blog piece is to introduce the concept of threat analysis, what it is and why it’s a good idea, while at the same time present a simple and effective way to try it yourself. It is part...
by Colin Robbins | Nov 18, 2013
Continuous Improvement November 2013 At Nexor, one of our company values is continuous improvement. When I say it’s a company value, I’m not talking about a checkbox on a form. This is something that is truly ingrained into everything we do, and it’s...