Network Enigma: History Repeats?

Encryption has long been valued for securing communications between two parties who do not wish a third to overhear.  The mechanisms for this have steadily become more complex over the years, with one such tool being the Enigma machine. Though the device gained most of its fame, (or infamy), from its extensive use by the…

written by

Security – a layered approach

From a number of recent surveys, it’s clear that more and more organisations are happy to accept that they will suffer a network security breach at some point and it is simply a matter of time.  Clearing up the mess post-issue and how to do it seems to be the focus now – which is…

written by

Axial’s Managing Director on Partnering with Ixia

written by

Axial’s Managing Director discussing our relationship with Gigamon

written by

Developing an IT Action Plan for GDPR

written by

Pay up or Else!

In last month’s blog I discussed your network potentially having numerous methods by which access could be achieved (Is yours an open door network?).  Sadly, it is often the case that when a security event occurs (notice I said “when”, not “if”) then the next step is how do you deal with that unsavoury event?…

written by

Is yours an open door network?

It would be impossible to have missed the significant increase in the number of companies who have had their proprietary and valuable data compromised by unknown individuals maliciously penetrating their networks without being spotted, stealing millions of sensitive data records, and the damage only being comprehended when the details of the e-heist go public.  From…

written by

You can’t decrypt everything!

You simply cannot decrypt everything!  I’m not saying you shouldn’t decrypt user traffic, but it is important to understand that some services simply cannot be decrypted. Here’s some basic information on SSL decryption: SSL is a protocol based on trust For example when SSL traffic is decrypted on a web proxy, you are breaking that…

written by

Say hello to HaLow!

Wi-Fi HaLow™ (pronounced ‘halo’) is a new low-power, long-range wireless technology designed to support and enhance the large variety of network connected physical objects that we call the Internet of Things. With considerable industry momentum building around the requirement for a low power wireless solution, the Wi-Fi Alliance announced this new technology earlier in the year, based on the pending IEEE 802.11ah specification….

written by

Axial Talking Point – Dealing with Cloud, BYOD and the Modern Threat Landscape

written by