Technology -> Security
Why data preservation is not just about safeguarding from digital threat
Simon Taylor, Co-founder and Chairman, Next Generation Data | 25th February 2015
Is your website fit and secure for King Consumer?
The owners of business to business (B2B) websites could learn from their consumer (B2C) facing counterparts.
Bob Tarzey, Quocirca | 12th February 2015
Banks and others accounting for BYOD
Banks and credit unions, like many other non-financial organizations, are quickly realizing the benefits of implementing bring your own device (BYOD)
Dean Wiech, Managing Director, Tools4ever | 20th January 2015
Many attacks may still be random, security should not be
Targeted attacks are getting all the headlines, but random attacks are still a widespread and insidious, but avoidable, problem.
Bob Tarzey, Quocirca | 23rd December 2014
Securing virtual worlds: the virtual infrastructure
When considering the security of virtual environments, there are two basic levels, the virtual platform itself and the virtual machines (VM) and associated applications deployed on such platforms.
Bob Tarzey, Quocirca | 18th December 2014
If Black Friday and Cyber Monday tested your websites and online apps to their limit, new Quocirca research shows what can be learnt from the those at the bleeding edge of dealing with consumers online.
Bob Tarzey, Quocirca | 5th December 2014
Business headlines from BBC News:
Published by: electronicdawn Ltd.