IT Forensics in Real Time
Posted on: 28 Apr 2014
In an ideal world threat intelligence should prevent IT security incidents from occurring in the first place; however, in reality incidents are inevitable, often with associated data breaches. Post-event clear…
The Safe Use of Test Data
Posted on: 27 Mar 2014
The best time to eliminate software bugs is early on in the application development lifecycle. Doing so helps ensure better code is released in the first place; it will be…
FIDO – Fast Identity Online: No More Dogs on the Internet
Posted on: 04 Mar 2014
Web users rely on SSL (secure sockets layer) on a regular basis without having to know what it is or even if it is securing their transactions and data in…
Convergence of SIEM and Forensics
Posted on: 26 Feb 2014
Sometimes technology areas that once seem distinct converge. Indeed there was a time when the term convergence was used, without qualification, to refer to the coming together of IT and…
Why Would they DoS Us?
Posted on: 03 Feb 2014
As various pundits have reeled off their security advice for 2014 many have listed the growing threat of denial of service (DoS) attacks as something to look out for. They…
Beyond Microsoft Active Directory
Posted on: 08 Jan 2014
Embedded in all Microsoft Windows server operating systems and in its Azure platform as a service offering is Active Directory; a store of information about all the objects and their…
The Increasing Mobility Threat to IT Security
Posted on: 02 Jan 2014
Any organization that has not already started to think about the impact mobility has on IT security should start doing so this year. 63% of businesses provide formal access to some…
Getting Real About Network Access Control (NAC)
Posted on: 29 Dec 2013
The two biggest concerns organizations have when considering the use of cloud based services are the safety of personal data and complying with data protection laws (see complimentary Quocirca report,…
Securing the Cloud – Coming if You’re Ready or Not
Posted on: 22 Oct 2013
No business can avoid “the cloud.” Some embrace cloud based services with enthusiasm as a formal way of delivering all or part of a given organization’s IT requirements, whilst others…