Security and the Cool Factor
Getting users to implement security into their lives may be a difficult task without the help of the marketing and advertising machinery of major tech companies
Ask the CISO
Do you have a burning information security question that you would like to ask a CISO? If so, this is the forum for you to ask those questions.
For Security, Organizational Structure May be Overrated
The reporting structure of the security function is a frequent point of discussion. Its prominence in the organizational chart will influence the amount of change it can drive. But regardless of where it ends up, its key asset in times of crisis isn’t reporting lines but the network of security and IT people it can draw on
A Day in the Life of Kent Row: The Random Crisis Conundrum
Working as an IT pro might not sound the like the most exciting role, but I like to think it is like being a detective
The Social Media Censor-Ship Has Sailed
The time has come to stop haranguing tech companies for their capacity to be misused
Tapsnake Infection: Not Very Likely
Pop-up messages telling you that you have a Tapsnake infection? Pretty unlikely
A Day in the Life of Kent Row…The Watchman’s Blindness
The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. Keeping a watchful eye on all systems therefore, remains key
Banning Encryption May Sound Absurd, But We Shouldn’t Laugh it Off
Tragic incidents like the Paris shootings must not be politically misused by the UK government as an opportunity to deprive individuals and businesses of their freedom to communicate
Many Attacks May Still Be Random; Security Should Not Be
Targeted attacks are getting all the headlines, but random attacks are still a widespread and insidious, but avoidable problem.
A Day in the Life of Kent Row… Wire Straits: When the Server Room Becomes Spaghetti Junction
The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. However, sometimes technology isn't the only challenge to IT admins...
Securing Virtual Worlds, Part 1: The Virtual Infrastructure
When considering the security of virtual environments, there are two basic levels, the virtual platform itself and the virtual machines (VM) and associated applications deployed on such platforms. This is the first of two Quocirca blog posts focused on the platform itself.
Don't Manufacture Cyber-Risk
The industrial sector is rapidly realizing the vast potential for digital-physical systems to improve efficiency and performance. However, this realization is going to incur an increase in both cyber-risk likelihood and impact to the sector’s production processes, supply chains and workforce