Bob Tarzey

Senior Director

Quocirca Ltd


Targeted Attacks Plague the EU Driving Data Protection Changes

Posted on: 02 Feb 2016

U.S. companies that operate in the European Union (EU) need to understand what drives European organizations when it comes to data protection. This applies to both commercial organizations that want to trade in Europe and IT suppliers that need to ensure the messaging around their products and services resound with local concerns. A recent Quocirca…

Is Your Identity and Access Management Fit for Purpose?

Posted on: 25 Jun 2015

In the old days, identity and access management (IAM) was a mainly internal affair; employees accessing applications, all safely behind a firewall. OK, perhaps the odd remote user, but they tunnelled in using a VPN and, to all intents and purposes, they were brought inside the firewall. Those days are long gone. Today the applications…

The Rise and Rise of Bad Bots – Part 2 – Beyond Web-Scraping

Posted on: 16 Apr 2015

Anyone who listened to Aleks Krotoski’s 5 short programs on Radio 4 in the UK titled Codes that Changed the World will have been reminded that applications written in COBOL, despite dating from the late 1950s, remain in widespread use. Although organizations are reliant on these applications they are often impossible to change as the original…

The Rise and Rise of Bad Bots – Part 1 – Little DDoS

Posted on: 15 Apr 2015

Many will be familiar with the term bot, short for web-robot. Bots are essential for effective operation of the web: web-crawlers are a type of bot, automatically trawling sites looking for updates and making sure search engines know about new content. To this end, website owners need to allow access to bots, but they can…

Insurance Companies Need to Eat Their Own Dog Food

Posted on: 26 Mar 2015

Many insurance companies aspire to sell policies to their customers that will provide financial mitigation against cyber-attacks. That is all well and good, but they need to make sure their own houses are order first. A recent Quocirca research report, Room for improvement, Building confidence in data security, which was sponsored by Digital Guardian, showed…

Is Your Online Security Fit for the Online Consumer?

Posted on: 02 Dec 2014

There are few businesses that are not dependent to some extent on their online presence. Websites are no longer simply a source of information, but a place to transact with customers. Often this will mean dealing with regulated personal and financial data and a commensurate investment in security is required. Those that fail to do…

The Problem of Buggy Software Components

Posted on: 03 Nov 2014

What do Heartbleed, Shellshock and Poodle all have in common? Well apart from being software vulnerabilities discovered in 2014, they were all found in pre-built software components, used by developers to speed-up the development of their own bespoke programs. Heartbleed was in OpenSSL (an open source toolkit for implementing secure access to web sites), Shellshock…

Web Security 3.0 – Is Your Business Ready?

Posted on: 03 Sep 2014

Security products have evolved with the use of the Internet. When web sites were largely static it was enough to tell users which URLs to avoid because the content was undesirable (porn etc.). As the web became a means distributing malware and perpetrating fraud, there was a need to identify bad URLs that appeared overnight…

The Security and Visibility of Critical National Infrastructure: ViaSat’s Mega-SIEM

Posted on: 17 Jul 2014

There has been plenty of talk about the threat of cyber-attacks on critical national infrastructure (CNI). So what’s the risk, what’s involved in protecting CNI and why, to date, do attacks seem to have been limited? CNI is the utility infrastructure that we all rely on day-to-day; national networks such as electricity grids, water supply…

Do Increasing Worries About Insider Threats Mean it is Time to Take Another Look at DRM?

Posted on: 03 Jul 2014

The encryption vendor SafeNet publishes a Breach Level Index that records actual reported incidents of data loss. Whilst the number of losses attributed to malicious outsiders (58%) exceeds those attributed to malicious insiders (13%), SafeNet claims that insiders account for more than half of the actual information lost. This is because insiders will also be…