Tapsnake Infection: Not Very Likely
Pop-up messages telling you that you have a Tapsnake infection? Pretty unlikely
A Day in the Life of Kent Row…The Watchman’s Blindness
The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. Keeping a watchful eye on all systems therefore, remains key
Banning Encryption May Sound Absurd, But We Shouldn’t Laugh it Off
Tragic incidents like the Paris shootings must not be politically misused by the UK government as an opportunity to deprive individuals and businesses of their freedom to communicate
Many Attacks May Still Be Random; Security Should Not Be
Targeted attacks are getting all the headlines, but random attacks are still a widespread and insidious, but avoidable problem.
A Day in the Life of Kent Row… Wire Straits: When the Server Room Becomes Spaghetti Junction
The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. However, sometimes technology isn't the only challenge to IT admins...
Securing Virtual Worlds, Part 1: The Virtual Infrastructure
When considering the security of virtual environments, there are two basic levels, the virtual platform itself and the virtual machines (VM) and associated applications deployed on such platforms. This is the first of two Quocirca blog posts focused on the platform itself.
Don't Manufacture Cyber-Risk
The industrial sector is rapidly realizing the vast potential for digital-physical systems to improve efficiency and performance. However, this realization is going to incur an increase in both cyber-risk likelihood and impact to the sector’s production processes, supply chains and workforce
A Day in the Life of Kent Row…IT Admin AKA Super Hero
The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. It's essential that business relationships keep up with the pace of change
IRISSCON 2014: Security Tales from the Emerald Isle
Ireland's premier cyber-security conference was an effective platform for discussion on the key challenges facing the industry
The Problem of Buggy Software Components
Security teams face a risk with software components developed out of house
NCSAM Wrap Up: A Boatload Of Security Tips At Your Fingertips
With National Cyber Security Awareness Month (NCSAM) coming to a close, it’s a good time to reflect on some of the topics published by (ISC)2 to help educate users from all walks of life
Wearable Tech: Preparing for a Smarter Future
With the Apple Watch set to truly kickstart the wearable boom, what are the security implications of a potential surge in new, smarter technology?