Month: February 2020
Securing the real perimeter – part 2
2020-02-25
In my last post, I went on about how the real perimeter of your network is at your users’ workstations. The actions that humans take…
Securing the real perimeter – part 1
2020-02-22
I was thinking about the way that the concept of a “perimeter” has changed in the time I have been in information security. (Obviously, I…
The biggest cloud threat? Us!
2020-02-06
Another cloud security issue caused not by the cloud, but by how people use the cloud. Security firm Sophos has been taking a look at…