Category Archives: Security

Visualising crises outside the visible spectrum

For decades, satellite remote sensing has provided fundamental insights in countless physical science fields such as ecology, geosciences, atmospheric physics, and chemistry. However, as it relates to human and socioeconomic processes, satellite remote sensing is an incredibly powerful tool that … Continue reading

Posted in Critical Infrastructure, Data, Incident Response, Satellite Technology, WAN | Leave a comment

New Satellite Technology a Possible ‘Game Changer’ for Communications

As the interoperability discussion continues, so does the frustration of many who have worked on this issue for decades but haven’t seen their goals realized. So it makes sense to take a look into the future of what could be … Continue reading

Posted in Critical Infrastructure, Data, Failsafe, Fortify, Incident Response, Resilience, Satellite Broadband, Video Conferencing, WAN | Leave a comment

Spread Spectrum Modulation Techniques

Wireless Local Area Networking technology today exploits a technology which was thitherto mostly hidden inside the shadowy domain of military communications and radar. This technology comprises a collection of ideas which are termed Spread Spectrum Techniques (SST). Spread Spectrum techniques have … Continue reading

Posted in Collaboration, Cryptography, Data, Home Networking, LAN, Mobile Telephony, Radio Solutions, Satellite Broadband, Small Business Communicate, WAN, Wireless LAN | Leave a comment

The Nessus Vulnerability Scanner

In computer security, Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. For example: Vulnerabilities that allow a … Continue reading

Posted in Access Control, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Test, Threat Management, Web Security | Leave a comment

Cisco Plays Catchup in DPI Test

If you’re a large enterprise with its own network, an ISP, or a company intent on claiming its own, online, the technology force of Deep Packet Inspection (DPI) is with you. But it may surprise you who shows up on the … Continue reading

Posted in Access Control, Cisco, Cloud Computing, Data, Innovation, Larger Enterprise, Manage, Network Management, Network Security, Optimisation, Optimise, Platform (PAAS), Security | Leave a comment

Researchers Release Attack Tool That Cripples Secure Websites

Researchers have released an attack tool that makes it trivial for anyone to take down websites that allow users to connect via secure connections. Unlike most denial-of-service attacks (DoS) that require an attacker to direct a network of distributed computers … Continue reading

Posted in Infrastructure (IAAS), Security | Leave a comment

How to Set Up a Wireless Network Webcam

If you want to monitor your home remotely with a security camera, using a wireless network camera is the most permanent way to do it. You can make do with a standard USB webcam (or use your iOS or Android … Continue reading

Posted in Home Networking, Home Security, Home Security, Monitor, Physical Security, Security, Small Business, Small Business Secure, Video, Video Surveillance | Leave a comment

The Problem of Tailgating in Secured Buildings

One of the biggest weaknesses of automated access control systems is the fact that most systems cannot actually control how many people enter the building when an access card is presented. Most systems allow you to control which card works … Continue reading

Posted in Building Management, Critical Infrastructure, Intrusion, Personnel Security, Physical Security, Security, Small Business Secure, Test, Threat Management | Leave a comment

Energy Retrofits and Building Automation Save the Life and Expenses of a Building

The environmental impact buildings have in the UK is at alarming levels — accounting for 40% of the nation’s energy usage and an equal percentage of carbon output, and, when you consider water consumption, waste management and vehicle transportation for … Continue reading

Posted in Building Management, Critical Infrastructure, Failsafe, Fortify, Intrusion, Maintenance, Operation, Operational Efficiency, Physical Security, Power, SCADA | Leave a comment

Which website shopping cart?

We have recently undertaken a study to determine which of the many shopping cart systems we should use on a customers website. After a long process trawling through the myriad of options we finally reached a shortlist of 8 candidates. … Continue reading

Posted in Design and Functionality, Development, E-Business, Electronic Commerce, Network Security, Search Engine Optimisation, Security, Small Business, Small Business Communicate, Uncategorized, Web Security, Web Services | Leave a comment