What can people really see when you use un-encrypted connections?

Although its becoming increasingly rare nowadays to be using un-encrypted connections, let’s see what it really means at the network level. Un-encrypted connections on their own are not necessarily a problem, its all about what value what you are sending has and therefore what could be exposed to a nefarious actor. If you are viewing […]

More...

Separation of Duties, Two-Person Control, (Principle of) Least Privilege and Need to Know

Information Security has a number of foundational concepts, such as the Confidentiality, Integrity and Availability of information, information assets and services. In this article we’ll explore four key concepts that are good to understand to assist you in building and configuring secure systems and therefore protecting and improving the Confidentiality, Integrity and Availability of your […]

More...