Last updated: 
2 months 6 days ago
Blog Manager

I'm the Information Security Manager at Janet and through this blog I'll be sharing some of my experiences, ideas and thoughts on information security topics.

Blog Article

When using software as a service (SaaS) there may be legitimate reasons for an external party to create e-mails from @jisc.ac.uk addresses. In the past this would have been a clear indication of phishing or other attacks, but now we need a more sophisticated approach to separating legitimate mails from malicious ones.

Blog Article

In anything other than the smallest organisations getting insight into how e-mail is being used can be difficult. Cloud based e-mail means that you no longer know technical details of even a trivial implementation, and colleagues can quickly setup SaaS services that send e-mail from your domains without involvement from IT.

Prev | Next