Looking under the covers, taking the smoke and mirrors away from vendors' stories, questioning the topics de jour - here, Quocirca's analysts provide their views on the business and technology world and what is of importance to you and your businesses in the real world.
Online security in insurance sector
Much of Quocirca’s research looks at the differing attitudes to IT between various business sectors. For example a 2014 report titled Online domain maturity, which was sponsored by Neustar, showed that retailers and financial services were the...
Bob Tarzey, Quocirca | 27th March '15
The software game - Perforce's new Helix Platform
A few years ago a friend of mine told me he was concerned that his son wanted to take a degree and find employment in the software games industry. I think my friend thought it might be a frivolous career path. Not at all, I reassured him, the games...
Bob Tarzey, Quocirca | 17th March '15
Many attacks may still be random, security should not be
With all the talk of targeted attacks, it is easy to lose sight of the fact that for the majority of us, especially in our lives as consumers, random malware is still the greatest danger. Random malware is distributed en masse, by whatever means, in...
Bob Tarzey, Quocirca | 23rd December '14
Securing virtual worlds: the virtual infrastructure
When considering the security of virtual environments, it helps to point out where in the virtual stack the discussion is alluding to. There are two basic levels, the virtual platform itself and the virtual machines (VM) and associated applications...
Bob Tarzey, Quocirca | 18th December '14
How did your web site stand up on Black Friday and Cyber Monday (Nov 28th and Dec 1st 2014)? These were expected to be the most frenetic online shopping days of the year. Whether you are an online retailer or processing the payments generated, if...
Bob Tarzey, Quocirca | 5th December '14
The problem of buggy software components
What do Heartbleed, Shellshock and Poodle all have in common? Well apart from being software vulnerabilities discovered in 2014, they were all found in pre-built software components, used by developers to speed up the development of their own...
Bob Tarzey, Quocirca | 18th November '14
Google Glass - seeing is believing
I must admit to being sceptical about the whole ‘wearables’ thing. However, I was intrigued at a recent Google event to be given an opportunity to try out a pair of Google Glass glasses. Glasses have been part of my life for as long as I...
Bob Tarzey, Quocirca | 7th November '14
Shadow IT in stores and branches: how to stay compliant
Branches are where the rubber still hits the road for many organisations; where retailers still do most of their selling, where much banking is still carried out and where health care is often dispensed. However, for IT managers, branches are...
Bob Tarzey, Quocirca | 3rd November '14
Do increasing worries about insider threats mean it is time to take another look at DRM?
The encryption vendor SafeNet publishes a Breach Level Index which records actual reported incidents of data loss. Whilst the number of losses attributed to malicious outsiders (58%) exceeds those attributed to malicious insiders (13%), SafeNet...
Bob Tarzey, Quocirca | 17th July '14
Cloud infrastructure services, find a niche or die?
Back in May it was reported that Morgan Stanley had been appointed to explore options for the sale of hosted services provider Rackspace. Business Week, May 16th reported the story with the headline Who Might Buy Rackspace? It's a Big List. 24/7...
Bob Tarzey, Quocirca | 16th July '14
Published by: electronicdawn Ltd.