Transport Layer Security (TLS)

Transport Layer Security (TLS) is a cryptographic protocol that protects data when it is transferred between devices over a network. It is commonly used to secure web-based applications over the internet. Given the explosion in cloud services, mobile computing and IoT devices, the underlying technology to secure the data in transit has become of critical…

‘Digital Outcomes (DOS) 6’ Supplier Award

We are delighted to announce that MIC Solutions Ltd has been awarded a place on the Digital Outcomes 6 (DOS) Framework. The DOS frameworks publish opportunities on the Digital Market place to find suppliers for technical digital projects within public sector organisations. DOS differs from the G-Cloud framework in that customers must know what it…

The rush towards public DNS

One result of the rush towards using large-scale public Domain Name Service (DNS) resolvers, such as Google and Cloudflare, is that critical and sensitive DNS queries are often handled by servers in different countries or even continents. This trend is introducing unexpected security, resilience, legal and data protection issues for policy makers and governments. With…

Software-Defined Perimeter Networks

Software-defined perimeter (SDP) networks are an advanced iteration of a zero-trust network (ZTN) strategy for access to enterprise resources. As organizations migrate more and more services to the cloud, regardless of deployment model or location, the potential attack surface is dramatically changed. Securing the data (not just the network) has therefore become an existential concern….

NCSC to update Cyber Essentials

The National Cyber Security Centre (NCSC) is planning to update the technical controls of its Cyber Essentials scheme in the new year. It has indicated that it will introduce an updated set of requirements on 24 January in the biggest overhaul since the scheme was first launched in 2014. The review comes in response to…

What is TPRM?

Imagine a world where people demand data on any device, from any location, 24/7.  To deliver this level of service, businesses are deploying cloud architecture for almost everything. But shadowing these decisions is the largest annual increase in successful cyber-attacks within the last six years, and when seen alongside a global shortage of IT security experts…

ISO/IEC publish ‘Cloud Computing Vocabulary’ standard

Unsure of the difference between public, private, hybrid or community cloud deployment models? Check out some helpful vocab and definitions in the recently published Joint Information and Telecommunication (JTC1) standard: ISO/IEC 22123-1:2021. In defining terms such as roles and activities, the difference between characteristics and capabilities, this new standard helps to demystify and remove some…

Microsoft’s latest cloud authentication outage: What went wrong

Microsoft is saying a ‘rotation of keys’ that handle authentication was to blame for a roughly 14-hour Azure outage that took down Office 365, Dynamics 365, Xbox Live and other Microsoft services on March 15th. Microsoft has published a preliminary root cause analysis of its March 15 Azure Active Directory outage, which took down Office,…