There were 3 blog postings during June (2012):
Beyond point security: advance IT security intelligence
Point security products such as firewalls, host-based anti-virus and email filtering have a job to do and often do it reasonably well. Arguably if they did not businesses would not buy them, although sometimes purchases are made more for compliance...
Bob Tarzey, Quocirca | 12th June '12
Businesses are over granting privilege and failing to limit sys-admin access
System administrators will often need wide ranging access to systems and devices to do their jobs, but systems are not the same as data. Many individuals working in IT departments will in fact be in relatively junior roles. Indeed, they may often be...
Bob Tarzey, Quocirca | 13th June '12
Discovering an old Flame
Computer malware programmes only take on a name and a personality after they have been discovered. These are bestowed by the IT security industry, our would-be defenders. Before this, malware is anonymous and unknown, just the way the perpetrators...
Bob Tarzey, Quocirca | 26th June '12
Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761