The 12 Themes of 2014

The 12 Themes of 2014 December 2014 Rather than bring you the 12 Days of Christmas, we’ve done the 12 themes of 2014 instead! A look back at what has been making the headlines in the world of Information Security (and beyond) this year. Take a moment to relive...

No, Shellshock does not defeat SELinux

No, Shellshock does not defeat SELinux October 2014 A week is a long time in Cyber Security. These past few weeks you may have heard about the latest ‘big vulnerability’, dubbed ShellShock. If you haven’t, or want more information on it, I direct you...

Trustworthy Communications

Trustworthy Communications March 2014 Each day we become more reliant on the Internet in both our personal and business lives, yet each day there are new stories of security failures. A key part of living and working on the Internet is the ability to be able to...

Building the Guard

Building the Guard February 2014 Okay. We’ve analysed the problem, we’ve produced an excellent design, and we’ve got our security approach nailed down. It’s time to get our hands dirty and actually build it. With a good design in place, one might assume that...

Booting Linux Securely

Booting Linux Securely February 2014 A report from Learning Tree “Linux Scores Highest in UK Government Security Assessment” has analysed the CESG set of reports on the security of end user devices, in which CESG assessed 11 operating systems. The Learning...