Archives for Blog

network topology map What is network topology? Types, components and how it works

A network’s topology describes its physical or logical arrangement, shaping how data moves, where failures occur, and how the network scales. It directly influences how infrastructure is designed and managed, with real-world networks combining multiple topologies to balance performance, resilience, cost and complexity. This guide explains what network topology is, how physical and logical topology…

read more
Network for Netomnia Netomnia: Who they are and what they do

Netomnia is a full fibre network builder and wholesale infrastructure provider in the UK. This guide covers who they are, how their network is built and delivered, where they operate, and how customers access their services through broadband providers. Who are Netomnia? Netomnia is an alternative network operator, commonly referred to as an “altnet”. They…

read more
CIA Triad Represented CIA Triad in Cybersecurity

The CIA triad is the foundational model behind how businesses protect their data. It defines three core principles (Confidentiality, Integrity, and Availability) that guide everything from access controls and encryption to backup strategies and disaster recovery. This guide breaks down each principle with real-world risks, practical controls, and a worked example showing how they apply…

read more
attribute-based context Attribute-based access control (ABAC) for businesses

Attribute-based access control (ABAC) is a modern access control model that grants permissions based on real-time context rather than fixed roles. Evaluating attributes such as user identity, device, location, and behaviour, it enables more precise and adaptive access decisions. This guide explains how ABAC works, how it relates to RBAC, where it fits in the…

read more
High-risk-environment-privileged-access Privileged Access Management (PAM): Securing high-risk environments

Privileged Access Management (PAM) is a cybersecurity control that specifically protects accounts with elevated access to critical systems. It prevents attackers from gaining unauthorised access that could cause severe damage, from sabotaging key infrastructure to stealing sensitive information. This guide explains what PAM is, why privileged access presents significant security risks, and how PAM platforms…

read more
A new company recruit. She will need to be added as a new identity through the HR system integration to the IAM. Joiner-Mover-Leaver (JML): The access lifecycle process

The Joiner-Mover-Leaver (JML) process governs how organisations grant, modify, and revoke access to systems throughout an identity’s lifecycle. It helps organisations maintain least-privilege access while reducing security and compliance risks. This guide explains how the JML lifecycle works, who is responsible for it, and how organisations manage access securely. Contents: What is the Joiner-Mover-Leaver (JML)…

read more