Resources

Skating on quicksand

This talk will discuss the types of security that can reasonably be expected to be implemented over the top of untrusted networks together with an analysis of some of those that cannot. It will discuss the types of solution that might be necessary in order to successfully implement a security solution over the top of an untrusted network and the types of threats that implementing such a solution might introduce.

Subscribe to the CW newsletter

This site uses cookies.

We use cookies to help us to improve our site and they enable us to deliver the best possible service and customer experience. By clicking accept or continuing to use this site you are agreeing to our cookies policy. Learn more

Start typing and press enter or the magnifying glass to search

Sign up to our newsletter
Stay in touch with CW

Choosing to join an existing organisation means that you'll need to be approved before your registration is complete. You'll be notified by email when your request has been accepted.

i
Your password must be at least 8 characters long and contain at least 1 uppercase character, 1 lowercase character and at least 1 number.

I would like to subscribe to

Select at least one option*