Eskenzi PR ad banner Eskenzi PR ad banner

Opinions & Analysis

The rapid pace of digitisation is fundamentally transforming the need for data analytics. As such, businesses need to rely on new data sources, such as machine-generated data vs. traditional structured data.   Insight into such data in real time is what gives companies the competitive edge they need to succeed. Machine-generated data is one of the fastest growing and complex areas of big data, it's also one of the most valuable, containing a definitive record of...

Read more

12 months have passed since a bug was publically revealed that would shape headlines, researchers and presentations for the next year.   A flaw in the OpenSSL cryptographic software library, Heartbleed allowed information protected by the SSL/TLS encryption to be captured by anyone on the internet who was able to read the memory of the systems protected by the vulnerable versions of the software.   A fix was released on April 7th 2014, and many...

Read more

Last week was the week of the last ever Symposium on Security for Asia Network (SyScan) conference in Singapore.   Well known for being unafraid to court controversy, SyScan had become something of a legend in vulnerability research circles. This year was no exception with a very public reaction to Blue Coat's alleged bullying of Airbus researcher Raphael Rigo's Proxy SG internals talk. But between the talks, the whiskey and an amazing badge there were...

Read more

Much like the iCloud “hack” story of last summer, it appears that another vault of sensitive details had been accessed because of users reusing the same credentials over and over for different services.   In the case of the British Airways incident, a third party “using information obtained elsewhere on the internet, via an automated process, to try to gain access”. So who wants to put money on this being done by a brute force...

Read more

An interesting email dropped into my inbox back at the start of March, and made we wonder if the headlines are affecting the way that businesses interact with customers. The email in question came from Lastminute.com, that great bastion of the dotcom that if I am honest, I used once and had not been aware I was even on a mailing list for anymore. But I am glad I was, as in announcing its acquisition...

Read more

This morning we are delighted to introduce the all new IT Security Guru website. After we launched the first full version of the website last January, we identified areas that we wanted to improve, and what we liked, and worked with designers and developers to build this new site that we hope you will find as easy to use and inviting as we do. So what is new? Well apart from the reduced (but still...

Read more
premier league hack

For many years, the Football Association centre of excellence was Lilleshall, a centre that was used to train players, coaches and create the stars of the future.   During this time, England produced some excellent players and the two great squads of the 1986 and 1990 World Cups, and the 1996 European Championships. However at some point, this centre was deemed to be unsuitable for use in the future a new facility would be built...

Read more

Facebook is to introduce a function that allows its one billion users to send money to friends.   According to the New York Times, American users of the Facebook Messenger app will be able to link their debit cards to the service, and use it to message money to one another just as easily as they send an image or text.   Analysts said that if the payment system succeeded, Facebook would extend it to...

Read more

A few months ago we marked three years since the European Union Data Protection Directive was announced and in this writer’s opinion, it’s time for “A little less conversation a little more action”.   This week I attended a roundtable hosted by Fujitsu, whose information assurance consultant John Alcock said that despite it still being two years away, it was time to consider it and it is something that he sees that security people want...

Read more

A tweet from a good friend of mine really summed up the situation in the US Goverment relating to the email of former First Lady and Secretary of State Hillary Clinton. Conference speaker and all round good security guy Jerry Gamblin said: “Hillary Clinton was just working around what she saw as inefficient IT policies. Shadow IT is a huge security risk for every company.” The world has apparently been shocked by the news that...

Read more
Page 25 of 42 1 24 25 26 42