Month: February 2020

Securing the real perimeter – part 2

In my last post, I went on about how the real perimeter of your network is at your users’ workstations. The actions that humans take…

Continue Reading

Securing the real perimeter – part 1

I was thinking about the way that the concept of a “perimeter” has changed in the time I have been in information security. (Obviously, I…

Continue Reading

The biggest cloud threat? Us!

Another cloud security issue caused not by the cloud, but by how people use the cloud.  Security firm Sophos has been taking a look at…

Continue Reading