Is it possible to use mobile data via a SIM card in an external device by knowing it’s IP address? [on hold]

I have a number of devices, these devices all have SIM cards and can be accessed remotely using a public IP address and also over encrypted WiFi.

The devices themselves use data in the following ways:

HTTP connections, all… Continue reading Is it possible to use mobile data via a SIM card in an external device by knowing it’s IP address? [on hold]

What asset details are the most relevant in a cyber security risk assessment procedure?

I am identifying organisation assets for a cyber security risk assessment. I am looking for guides or industry best practices for what asset details are actually useful for the risk assessment procedure.

We can easily get a lot of inform… Continue reading What asset details are the most relevant in a cyber security risk assessment procedure?

Banking: Ubuntu virtual machine and virtual keyboard, or full Ubuntu install on USB drive?

I am mildly paranoid about protecting the security of my financial accounts. I often use Tails on a live USB for its light weight and amnesia. However, I also require the use of Chrome to visit some sites that I trust. Tails … Continue reading Banking: Ubuntu virtual machine and virtual keyboard, or full Ubuntu install on USB drive?

When generating PKI key pair with a smart card, who decides if the key is exportable?

I’m in the process of obtaining a code signing certificate from a CA that requires the use of a smart card for the generation of the PKI key pair.
However, I would like to be in the possession of the private key, and not depe… Continue reading When generating PKI key pair with a smart card, who decides if the key is exportable?