Journal

Interconnected devices and the true ?internet? cause security challenges to organisations with critical legacy systems. This article discusses a number of legacy issues around Industrial Control Systems and ?untouchable? legacy devices and proposes a number of easy and effective mitigations to the practices that expose them to the world.

December 2015

Journal

Interconnected devices and the true ?internet? cause security challenges to organisations with critical legacy systems. This article discusses a number of legacy issues around Industrial Control Systems and ?untouchable? legacy devices and proposes a number of easy and effective mitigations to the practices that expose them to the world.

December 2015

Journal

When faced with the need to move their services to the National Broadband Network (NBN), many consumers discover quite late in the process that their new NBN-based service has left their legacy PSTN connect devices behind.

December 2015

Journal

Computer systems, technologies and applications that do not meet current standards, known as legacy systems, are increasingly connected to the Internet for various reasons. Connecting them to an environment that they were never intended for can potentially have serious operational security risk implications. This article discusses some of the reasons.

December 2015

Journal

Computer systems, technologies and applications that do not meet current standards, known as legacy systems, are increasingly connected to the Internet for various reasons. Connecting them to an environment that they were never intended for can potentially have serious operational security risk implications. This article discusses some of the reasons.

December 2015

Journal

The subject of legacy telecommunication systems is often overlooked in the pursuit of technological advancement, yet somehow the result is often less than graceful with end users left walking a tightrope between technology they are familiar with, and the evolving replacement systems.

December 2015