It’s beginning to look a lot like chaos

Please join in, in singing along to our alternative Christmas song to the tune of “It’s beginning to look a lot like Christmas” It’s beginning to look like chaos, Everywhere I glance. Take a look at the firewall, I’m worried it’s going to fall And give an intruder a fighting chance. ———————————————- It’s beginning to look…

written by

Network as a Restaurant…

I will say right up front – I’m a foodie.  I like to cook and I like to dine out too. When I do dine out, I want to choose what I want off the menu – I don’t want to be told what I have to eat. Imagine if you went to a restaurant…

written by

Ho Ho Oh No!

Have you put up your Christmas tree yet?  I did, then I noticed a distinct lack of Christmas cheer from the usually happy bunch of elves I call my children who were struggling with streaming this, facebooking that and whatsapping the other. Their happy little faces were etched with the pain of poor connectivity to…

written by

“The Enemy of My Enemy…”

It’s almost a truism, but cyber criminals will always be ahead of the curve, and everyone else will continually be stuck playing catch up. With no silver bullet “one size fits all” and multiple point solutions all shouting loudly for the attention of customers, it can feel like we are fighting to not be last,…

written by

When Christmas Trees attack!

No, it’s not another take on those mindless pulp TV shows like “When Goldfish/Cats/Toilets Attack” in case you were wondering . . .. The Christmas Tree attack is a real world method of determining the underlying nature of a TCP/IP (Transmission Control Protocol/ Internet Protocol) stack and is often used in the reconnoitre phase of…

written by

Network Enigma: History Repeats?

Encryption has long been valued for securing communications between two parties who do not wish a third to overhear.  The mechanisms for this have steadily become more complex over the years, with one such tool being the Enigma machine. Though the device gained most of its fame, (or infamy), from its extensive use by the…

written by

Security – a layered approach

From a number of recent surveys, it’s clear that more and more organisations are happy to accept that they will suffer a network security breach at some point and it is simply a matter of time.  Clearing up the mess post-issue and how to do it seems to be the focus now – which is…

written by

Axial’s Managing Director on Partnering with Ixia

written by

Axial’s Managing Director discussing our relationship with Gigamon

written by

Developing an IT Action Plan for GDPR

written by