Looking under the covers, taking the smoke and mirrors away from vendors' stories, questioning the topics de jour - here, Quocirca's analysts provide their views on the business and technology world and what is of importance to you and your businesses in the real world.
Recent Blog Posts
At least 1 in 5 Europe enterprises lose data through targeted cyber attacks
Many European businesses now see targeted cyber-attacks as an inevitability that must be managed. New Quocirca research looks at the experiences of 600 European enterprises over the last 12 months and list the worst 40 reported incidents.
Bob Tarzey, Quocirca | 14th January '16
Neustar to securely guide things
Neustar, a supplier of real time online information services, is re-thinking its priorities as it has had to re-align its business in the USA. The growth of the internet of things should see its star rise in Europe and elsewhere
Bob Tarzey, Quocirca | 21st December '15
Containing the application security problem
Containerisation is proving to be a popular and effective way of deploying apps, especially in a DevOps environment. This poses new security challenges, but also new security solutions.
Bob Tarzey, Quocirca | 12th December '15
A simpler online life: trusted use of your social identity
Using social identities to login into other services can make our online lives more convenient and secure. However, there must be choice and backend identity management must evolve the support the concept.
Bob Tarzey, Quocirca | 11th December '15
The rise of digital natives and their enthusiasm for cloud services
As digital natives enter management positions and shadow IT deployments become an accepted norm, the choice is no longer whether or not to adopt cloud-based services, but about how secure their use us.
Bob Tarzey, Quocirca | 19th August '15
Securing the Internet of Things - time for another look at Public Key Infrastructure (PKI)?
The increasing use of the IoT to support a wide range of business processes has huge potential value for businesses; however, it also opens up a new security front that has led to renewed interest in Public Key Infrastructure (PKI).
Bob Tarzey, Quocirca | 18th August '15
Confidence in data security part 2 - Weak links
All organisations are dependent on information supply chains; these improve customer communications and business processes. However, to exploit information supply chains to the full requires confidence on data security.
Bob Tarzey, Quocirca | 17th August '15
Confidence in data security part 1 - Room for improvement
Improving user knowledge, deploying advanced technology and co-ordinating incident response and policy all make a big difference in the level of confidence organisation have about data security
Bob Tarzey, Quocirca | 11th August '15
Securing joined-up government: the UK's Public Service Network (PSN)
UK government organisations can apply to join the UK Public Service Network (PSN). To do so they must be able to ensure and prove their use of the PSN is compliant. Network access control (NAC) technology helps achieve this goal.
Bob Tarzey, Quocirca | 20th July '15
Is your identity and access management fit for purpose?
European organisations are struggling to adapt legacy identity and access management (IAM) systems for integrating external users. Many are turning the IAM-as-a-service to supplement in-house systems.
Bob Tarzey, Quocirca | 17th July '15