There were 3 blog postings during August (2011):
Whitelisting and change control for improving integrity
Today's security threats are complex and sophisticated and are getting ever harder to defend against. Attackers use multiple methods and vectors to try to bury deep into networks and are increasingly looking for longer term gain, rather than just a...
Fran Howarth, Bloor Research | 16th August '11
What did IPv6 Day prove?
IPv6 Day came and went without much fanfare. That is because, according to participants, it worked. True, there were a few problems encountered, but no more than expected and that was one of the main points of the exercise anyway. According to...
Fran Howarth, Bloor Research | 30th August '11
The security challenges of modern data centres
To reduce complexity, a high proportion of organisations are looking at modernising their data centre infrastructure through consolidation, virtualisation and by leveraging the cloud. In traditional data centres, security controls can be applied to...
Fran Howarth, Bloor Research | 29th August '11
Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761