Challenges with unique passwords
It is very important to have different passwords for each different system you have (to make sure that if a password is compromised, only one system will be affected). How many of us can honestly say...
View ArticleDoes Cyber Hype offer Hope
In the last few weeks we have seen another round of cyber security hype: Flame virus running rampant LinkedIn passwords broken Crypto broken RSA tokens broken in 15 minutes Does this help the cause,...
View ArticleWhy has encrypted email not taken off?
Recently a colleagues tweet took me to a news article promoting the use of secure (encrypted) email. The article was promoting this as a sensible thing to do, and provided a check list of how to do it....
View ArticleHow a strong BYOD password can make identity theft easier
I regularly take a train journey into London, it takes about an hour an a half. During this time I learn a great deal from reading, not books, but the laptop of the person sitting next to me. This is …...
View ArticleWhose Role is Security?
At a recent Industry event discussing security, a question was rasised as to who needs to take ownership of security issues, the comment was made that it needs to be “someone senior enough to care, but...
View ArticleHotel room zero-factor authentication
A few nights ago I stayed in a Hotel in London. On returning to the room after dinner, my room key card did not work. This has occurred a few times recently, I need to learn that putting the magnetic …...
View ArticleSmart Homes / Meters: Consumer Progress or Nightmare
The futuristic visions promoted by Smart Metering and Smart Cities are compelling on several levels. Add into the mix an Internet connected car. As a security person it worries be how this all joins up...
View Article1999 Conference – Risks of electronic attack on Britain’s Critical National...
In 1999, In Britain, Margaret Beckett, then leader of the Commons, hosted a closed conference for industrialists and intelligence officials to warn about the growing risk of electronic attack on...
View ArticleEthernet over Power
In my blog about smart meters I asked who is looking after the consumers interest in smart meters. Ethernet over Power adds a new dimension to the debate. I received many private comments on the smart...
View ArticleSofa Data Protection No So Good
Just purchased a new sofa – how can that cause a data protection failure? Well I agreed the details of the purchase with the sales person, and he started to enter my details into his computer screen....
View ArticleDM Twitter Phishing
Twitter users, watch out for Direct Messages suggesting you look at a picture of yourself… In the last week, I have had 3 twitter DMs attempting to phish. Two suggested Hey, check out this picture of...
View ArticleRevelations of a Password Reset
I recently had to reset my password on a Internet service I use. As usual, the process asked me for my email address, and said it would duly send me an email with reset instructions. No problem there....
View ArticleEvolution of Common Criteria
Nexor have received Common Criteria certification for our Sentinel Product, as required by our customers. Common Criteria is a scheme that is both much criticised and undergoing evolution. A positive...
View ArticlePDF Security: protection from zero-day content-based malware attacks
Nexor have just released a press statement about a new approach to protecting against PDF viruses and file based malware that has been incorporated into Nexor Merlin. In the press release I am quoted...
View ArticleLogging on is becoming too hard to do securely
Unique passwords, unique user names, lie about your personal information, secure your recovery email, two factor authentication, OAuth caching. ARRGGGHHH, all I want to do is log on. I can remember the...
View ArticleI only went to the Doctors…
I went to the Doctors recently. Didn’t expect to come across a security issue during my consultation, but… I entered the consulting room, sat down, and we started to chat and the phone went. The Dr...
View ArticleDo you deploy 2 percent of your staff on Network Security?
In the blog article “Why don’t organisations adopt cyber security measures?” the Tony Dyhouse observes A key finding in the report refers to the current practice of lumping together any company with...
View ArticleGuest Blog: Are you in charge of your car’s computer?
While indulging my interest the new Audi R8 (completely speculatively of course I wish I could own one!) I was distracted and amazed by the mass of electronic systems involved in a car of that range....
View ArticleObservations on the Forrester Report — Strategy Deep Dive: Define Your Data
The Forrester report Strategy Deep Dive: Define Your Data (free download, registration required) has an in-depth look at the topic of data classification and defines a framework for data protection,...
View ArticleYour Password is Obsolete
Following on from my blog article Logging on is becoming too hard to do securely here is a good info graphic about the state of passwords:
View Article
More Pages to Explore .....