Bob Tarzey

Job title:
Analyst and Director, Quocirca Ltd

Biography:
Bob joined Quocirca in 2002, his main area of coverage is route to market for ITC vendors, but he also has a specific focus on IT security, network computing, systems management and managed services. Bob writes regular analytical columns and blogs for Computing, Computer Weekly, silicon.com, Computer Reseller News (CRN), Infosecurity Magazine and IT Director. He has has written for The Times, Financial Times and The Daily Telegraph and provides general comment for the European IT and business press. Bob has extensive knowledge of the IT industry. Prior to joining Quocirca in he spent 16 years working for US technology vendors including DEC (now HP), Sybase (now SAP), Gupta, Merant (now Serena), eGain and webMethods (now Software AG). Bob has a BSc in Geology from Manchester University and PhD in Geochemistry from Leicester University.

Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

All Bloggers » Bob Tarzey
0
comments
The encryption vendor SafeNet publishes a Breach Level Index that records actual reported incidents of data loss. While the number of losses attributed to malicious outsiders (58%) exceeds those attributed to malicious insiders (13%), SafeNet claims that insiders account for more than half of t ...
Posted 16 July 2014 by Bob Tarzey
0
comments
As the web has evolved, so have the security products and services that control our use of it. In the early days of the “static web” it was enough to tell us which URLs to avoid because the content was undesirable (porn, etc.) As the web became a means distributing malware and perpetrati ...
Posted 28 April 2014 by Bob Tarzey
0
comments
It will not be news to anyone who has written code that the time to kill software bugs is early on in the application development lifecycle, before they can have a major impact. This is important for three reasons: first, better code is likely to be released in the first place; second, it will be le ...
Posted 21 March 2014 by Bob Tarzey
0
comments
Convergence of SIEM and Forensics
Sometimes technology areas that once seem distinct converge. Indeed, there was a time when the term convergence was used, without qualification, to refer to the coming together of IT and traditional telephone networks, something that for many is now just an accepted reality. During two recent discu ...
Posted 10 March 2014 by Bob Tarzey
0
comments
The protection of personal data has been back in the news in the UK over the last month due to the government bungling plans to make anonymized NHS patient data available for research. The scheme gives NHS patients the option to opt-out of sharing their data: why? NHS care in the UK is mostly provid ...
Posted 10 March 2014 by Bob Tarzey
0
comments
Here’s a dull-sounding question: Imagine a world without SSL (secure sockets layer) or its successor TLS (transport layer security)? A security tech-head may find the whole thing quite interesting, but for the average IT user, despite relying on SSL day-in, day-out, it will not arouse much exc ...
Posted 03 March 2014 by Bob Tarzey
0
comments
Why Would they DoS Us?
As various pundits have reeled off their security advice for 2014, many have listed the growing threat of denial-of-service (DoS) attacks as something to look out for. They are probably right to do so; two recent publications, the Arbor Worldwide Infrastructure Security Report (WISR) and the Prolexi ...
Posted 10 February 2014 by Bob Tarzey
0
comments
Extending Microsoft Active Directory
Microsoft Active Directory is a database embedded in all Windows server operating systems and in Windows Azure (Microsoft’s cloud-based platform-as-a-service/PaaS offering). The directory is used to store information about objects and their attributes that are active within a given Windows net ...
Posted 06 January 2014 by Bob Tarzey
0
comments
How do you quantify the impact of mobility on IT security? That this is a challenge all organizations need to face up to cannot be doubted; a 2013 Quocirca research report, Digital identities and the open business, showed that 63% of businesses provide formal access to some of their business applica ...
Posted 13 December 2013 by Bob Tarzey
0
comments
It is an old mantra when it comes to IT security that the user is the weakest link, but it is one that must be addressed. Technology helps: for example, through the use of single sign on (SSO) systems with strong authentication to get around the issue of having to remember multiple usernames and pas ...
Posted 27 November 2013 by Bob Tarzey
1
comment
A new Quocirca research report underlines the importance of application delivery controllers (ADCs) and the skills needed to deploy and manage them. So, what exactly is an ADC and where can you get one? ADCs are basically next-generation load balancers and are proving to be fundamental building blo ...
Posted 18 November 2013 by Bob Tarzey
0
comments
Securing Amazon Web Services
On September 17, 2013, Quocirca attended the Amazon Web Services (AWS) Enterprise Summit in London. The rate of growth of the vendor’s online infrastructure is remarkable if its own figures are to be believed. Using itself as a yardstick, AWS says it is adding enough new infrastructure a ...
Posted 20 September 2013 by Bob Tarzey
0
comments
Network Access Control in the Real World
Quocirca research shows that the two biggest concerns organisations have when considering the use of cloud-based services are the safety of personal data and complying with the data protection laws (see free Quocirca report, 'The Adoption of Cloud-based Services'). The report shows that these are is ...
Posted 05 September 2013 by Bob Tarzey
0
comments
At the recent IT Security Analysts Forum in London, organised by Eskenzi PR, one could be forgiven for thinking that the dozen or so vendors represented were all fierce competitors. Their high-level taglines all sounded pretty similar; “we secure your business’s data”, “our p ...
Posted 10 July 2013 by Bob Tarzey
0
comments
Policing the Virtual Perimeter
A recent spate of targeted denial of service attacks on organisations such as Spamhaus and Bitcoin remind that such attacks are seen as one of the best ways to attempt to halt or slow key internet-based services by those with a motive to do so. Many IT managers probably look-on, shrug their shoulder ...
Posted 11 April 2013 by Bob Tarzey
0
comments
Naming a company you founded after yourself can be problematic. OK, no one tries to place the blame for HP’s recent woes on Bill Hewlett or Dave Packard (anyway, according to HP’s current management a big turnaround in fortune is underway). However, the ups and downs of Dell are still cl ...
Posted 10 April 2013 by Bob Tarzey
0
comments
The Age of Bring-Your-Own-Identity (BYOID)
Sellers of computer security products and services sometimes fret that their messaging is too scary as they go on about risk, data loss and regulatory fines. To get around this, every so often they like to remind potential buyers that their wares are also business enablers. The case is easier to mak ...
Posted 11 March 2013 by Bob Tarzey
0
comments
Facebook, Twitter, Apple and Microsoft: all icons of the information technology industry and all the focus of targeted attacks in Feb 2013. The bad news for us all is, that even those that should be some of the most tech-savvy companies in the world, can fall foul of targeted attacks.   Micro ...
Posted 01 March 2013 by Bob Tarzey
0
comments
Symantec versus CA
Two back-to-back events recently saw Quocirca talking to veterans of the software industry: CA and Symantec. The high-level message from both is pretty much to same – we help to secure and manage your data and IT infrastructure. Yet, it is rare to find these two head-to-head; because, in ...
Posted 27 November 2012 by Bob Tarzey
0
comments
Even amongst those outside the IT industry, it is popular to speculate where we would be without the internet; what would happen if you could switch if off over night? Those in the know like to point out that fault tolerance, through alternative routing, was one of this reasons for the internet&rsqu ...
Posted 07 November 2012 by Bob Tarzey
Showing 1 - 20 of 49 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×