Bob Tarzey

Senior Director

Quocirca Ltd


Targeted Attacks Plague the EU Driving Data Protection Changes

Posted on: 02 Feb 2016

U.S. companies that operate in the European Union (EU) need to understand what drives European organizations when it comes to data protection. This applies to both commercial organizations that want…

Is Your Identity and Access Management Fit for Purpose?

Posted on: 25 Jun 2015

In the old days, identity and access management (IAM) was a mainly internal affair; employees accessing applications, all safely behind a firewall. OK, perhaps the odd remote user, but they…

The Rise and Rise of Bad Bots – Part 2 – Beyond Web-Scraping

Posted on: 16 Apr 2015

Anyone who listened to Aleks Krotoski’s 5 short programs on Radio 4 in the UK titled Codes that Changed the World will have been reminded that applications written in COBOL, despite…

The Rise and Rise of Bad Bots – Part 1 – Little DDoS

Posted on: 15 Apr 2015

Many will be familiar with the term bot, short for web-robot. Bots are essential for effective operation of the web: web-crawlers are a type of bot, automatically trawling sites looking…

Insurance Companies Need to Eat Their Own Dog Food

Posted on: 26 Mar 2015

Many insurance companies aspire to sell policies to their customers that will provide financial mitigation against cyber-attacks. That is all well and good, but they need to make sure their…

Is Your Online Security Fit for the Online Consumer?

Posted on: 02 Dec 2014

There are few businesses that are not dependent to some extent on their online presence. Websites are no longer simply a source of information, but a place to transact with…

The Problem of Buggy Software Components

Posted on: 03 Nov 2014

What do Heartbleed, Shellshock and Poodle all have in common? Well apart from being software vulnerabilities discovered in 2014, they were all found in pre-built software components, used by developers…

Web Security 3.0 – Is Your Business Ready?

Posted on: 03 Sep 2014

Security products have evolved with the use of the Internet. When web sites were largely static it was enough to tell users which URLs to avoid because the content was…

The Security and Visibility of Critical National Infrastructure: ViaSat’s Mega-SIEM

Posted on: 17 Jul 2014

There has been plenty of talk about the threat of cyber-attacks on critical national infrastructure (CNI). So what’s the risk, what’s involved in protecting CNI and why, to date, do…

Do Increasing Worries About Insider Threats Mean it is Time to Take Another Look at DRM?

Posted on: 03 Jul 2014

The encryption vendor SafeNet publishes a Breach Level Index that records actual reported incidents of data loss. Whilst the number of losses attributed to malicious outsiders (58%) exceeds those attributed…