Advice: Protecting Lone Workers Through Covid Restrictions

Protecting lone workers is an issue that businesses may not have come across previously, especially those based in busy city centre office blocks pre-coronavirus. Yet with many thriving business districts deserted through a lockdown and not everyone ab… Continue reading Advice: Protecting Lone Workers Through Covid Restrictions

Encrypting links between registered users and their sensitive data

I want to make it impractical to link the users to their sensitive data without their passwords – even with a full access to the database.
Furthermore, if a user has multiple pieces of sensitive data, I also want to avoid linking the diffe… Continue reading Encrypting links between registered users and their sensitive data

The Role of Access Control in Information Security

Access control systems are everywhere and play a key role in identity and access management (IAM)— let’s break down the different types of access control models & how they work…
The post The Role of Access Control in Information Security appeare… Continue reading The Role of Access Control in Information Security

Bitglass’ 2020 Cloud Security Report

This year, the fabric of our society has forgone unimaginable changes due to the global pandemic, and it’s likely that the impact will persist long after it is gone. The inevitable push towards a remote, cloud-first business ecosystem has catapulted i… Continue reading Bitglass’ 2020 Cloud Security Report

Difference between access control systems that can/can’t be compromised without valid credentials?

Take the following examples:

When I run sshd, it can in theory grant access to anything that the process itself has access to, regardless of provided credentials. For example, I could in theory modify a single if statement in the sshd sou… Continue reading Difference between access control systems that can/can’t be compromised without valid credentials?