We were recently asked to assess a risk adverse environment in which there was (I don’t know the collective noun) a “chunk” of Cisco kit, comprising both switches and ASA firewalls. We needed to make sure it was being accessed in a secure manner. Continue reading
This document discusses the security of Apple iOS with particular focus on its usage in the workplace. Continue reading
CRESTCon presentation looking at the Windows Domain Authentication model. Continue reading