Technology -> Security
The problem of buggy software components
Software components constitute the majority of the code in many applications and are consequently a source of many security vulnerabilities. How can this problem be better managed?
Bob Tarzey, Quocirca | 18th November 2014
Shadow IT in stores and branches: how to stay compliant
Managing branches has always been a challenge for distributed organisations, the problem is exacerbated with the growth of shadow IT. Pwnie Express says it can help to keep branch IT use secure and compliant.
Bob Tarzey, Quocirca | 3rd November 2014
Five ways to make identity management work best across hybrid computing environments
A BriefingsDirect discussion centers on learning new best practices for managing the rapidly changing needs around identity and access management.
Dana Gardner, Interarbor Solutions | 30th October 2014
Datacentres as a commodity
For those working in the fast moving world of cloud computing it is easy to take the view that the choice of data centre is irrelevant; that although it is an essential piece of the jigsaw, one data centre is just the same as another.
Nick Razey, Co-founder and CEO, Next Generation Data | 15th August 2014
Belt and braces: how to keep end user computing secure
Effective user end point security must address managed and unmanaged device, this requires centralised as well as on device controls. The best starting point is to focus on data
Bob Tarzey, Quocirca | 12th August 2014
The security and visibility of critical national infrastructure: ViaSat's mega-SIEM
Critical national infrastructure is dependent on network communications which should be protected in the same way as dedicated IT networks. This includes security information and event monitoring (SIEM).
Bob Tarzey, Quocirca | 30th July 2014
Business headlines from BBC News:
Published by: electronicdawn Ltd.