A Day in the Life of Kent Row… Wire Straits: When the Server Room Becomes Spaghetti Junction
The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. However, sometimes technology isn't the only challenge to IT admins...
Securing Virtual Worlds, Part 1: The Virtual Infrastructure
When considering the security of virtual environments, there are two basic levels, the virtual platform itself and the virtual machines (VM) and associated applications deployed on such platforms. This is the first of two Quocirca blog posts focused on the platform itself.
Don't Manufacture Cyber-Risk
The industrial sector is rapidly realizing the vast potential for digital-physical systems to improve efficiency and performance. However, this realization is going to incur an increase in both cyber-risk likelihood and impact to the sector’s production processes, supply chains and workforce
A Day in the Life of Kent Row…IT Admin AKA Super Hero
The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. It's essential that business relationships keep up with the pace of change
IRISSCON 2014: Security Tales from the Emerald Isle
Ireland's premier cyber-security conference was an effective platform for discussion on the key challenges facing the industry
The Problem of Buggy Software Components
Security teams face a risk with software components developed out of house
NCSAM Wrap Up: A Boatload Of Security Tips At Your Fingertips
With National Cyber Security Awareness Month (NCSAM) coming to a close, it’s a good time to reflect on some of the topics published by (ISC)2 to help educate users from all walks of life
Wearable Tech: Preparing for a Smarter Future
With the Apple Watch set to truly kickstart the wearable boom, what are the security implications of a potential surge in new, smarter technology?
Trading in privacy doesn't increase security
Apple and Google are encrypting phones by default; Twitter, Facebook and others are increasing the security and privacy of their users. But law enforcement agencies in the US and UK are concerned by a perceived loss of access to the data. Is it worth trading in the privacy of our digital lives for the promise of security in the real world?
#InfosecHeroes Nominate & Donate
Nominate an information security professional that you consider has brought some outstanding achievements to the industry, whilst raising money for WhiteHatRally
Critical National Infrastructure: How to Protect Vital Systems
Critical National Infrastructure is dependent on network communications, which should be protected in the same way as dedicated IT networks. This includes security information and event monitoring (SIEM)
Shadow IT in Stores and Branches: How to Stay Compliant
Branches are where the rubber still hits the road for many organisations; where retailers still do most of their selling, where much banking is still carried out and where health care is often dispensed. However, for IT managers, branches are outliers, where rogue activity is hard to curb; this means branches can become security and compliance black spots.