Transport Layer Security (TLS)

Transport Layer Security (TLS) is a cryptographic protocol that protects data when it is transferred between devices over a network. It is commonly used to secure web-based applications over the internet. Given the explosion in cloud services, mobile computing and IoT devices, the underlying technology to secure the data in transit has become of critical…

‘Digital Outcomes (DOS) 6’ Supplier Award

We are delighted to announce that MIC Solutions Ltd has been awarded a place on the Digital Outcomes 6 (DOS) Framework. The DOS frameworks publish opportunities on the Digital Market place to find suppliers for technical digital projects within public sector organisations. DOS differs from the G-Cloud framework in that customers must know what it…

The rush towards public DNS

One result of the rush towards using large-scale public Domain Name Service (DNS) resolvers, such as Google and Cloudflare, is that critical and sensitive DNS queries are often handled by servers in different countries or even continents. This trend is introducing unexpected security, resilience, legal and data protection issues for policy makers and governments. With…

Software-Defined Perimeter Networks

Software-defined perimeter (SDP) networks are an advanced iteration of a zero-trust network (ZTN) strategy for access to enterprise resources. As organizations migrate more and more services to the cloud, regardless of deployment model or location, the potential attack surface is dramatically changed. Securing the data (not just the network) has therefore become an existential concern….

NCSC to update Cyber Essentials

The National Cyber Security Centre (NCSC) is planning to update the technical controls of its Cyber Essentials scheme in the new year. It has indicated that it will introduce an updated set of requirements on 24 January in the biggest overhaul since the scheme was first launched in 2014. The review comes in response to…

DNS Threats

As the world becomes more dependent on technology, the underlying architecture becomes even more important. A key, often hidden (or simply overlooked) technology is Domain Name Service. DNS is the service that gets you there. Or to put it in technical terms… the service that resolves a URL into an IP address to enable network…

What is TPRM?

Imagine a world where people demand data on any device, from any location, 24/7.  To deliver this level of service, businesses are deploying cloud architecture for almost everything. But shadowing these decisions is the largest annual increase in successful cyber-attacks within the last six years, and when seen alongside a global shortage of IT security experts…

The Quantum threat to cryptography

The quantum threat to both symmetric and asymmetric cryptography is that a secret key is brute forced by a quantum computer. But, how this is achieved by quantum computers is different. The attack on a symmetric key pair is the same as that performed by the computers of today, in that the quantum computer will…

ISO/IEC publish ‘Cloud Computing Vocabulary’ standard

Unsure of the difference between public, private, hybrid or community cloud deployment models? Check out some helpful vocab and definitions in the recently published Joint Information and Telecommunication (JTC1) standard: ISO/IEC 22123-1:2021. In defining terms such as roles and activities, the difference between characteristics and capabilities, this new standard helps to demystify and remove some…

Application Security: Prevention beats cure

Prevention of risk is a priority for many of us in both personal and professional lives. This holds true now more than ever with not only the covid-19 pandemic but also the proliferation of attack vectors targeting our personal and business information. The questions then becomes, how do we consider the “prevention is better than…