Opinions & Analysis

This morning we are delighted to introduce the all new IT Security Guru website. After we launched the first full version of the website last January, we identified areas that we wanted to improve, and what we liked, and worked with designers and developers to build this new site that we hope you will find as easy to use and inviting as we do. So what is new? Well apart from the reduced (but still...

Read more

For many years, the Football Association centre of excellence was Lilleshall, a centre that was used to train players, coaches and create the stars of the future.   During this time, England produced some excellent players and the two great squads of the 1986 and 1990 World Cups, and the 1996 European Championships. However at some point, this centre was deemed to be unsuitable for use in the future a new facility would be built...

Read more

Facebook is to introduce a function that allows its one billion users to send money to friends.   According to the New York Times, American users of the Facebook Messenger app will be able to link their debit cards to the service, and use it to message money to one another just as easily as they send an image or text.   Analysts said that if the payment system succeeded, Facebook would extend it to...

Read more

A few months ago we marked three years since the European Union Data Protection Directive was announced and in this writer’s opinion, it’s time for “A little less conversation a little more action”.   This week I attended a roundtable hosted by Fujitsu, whose information assurance consultant John Alcock said that despite it still being two years away, it was time to consider it and it is something that he sees that security people want...

Read more

A tweet from a good friend of mine really summed up the situation in the US Goverment relating to the email of former First Lady and Secretary of State Hillary Clinton. Conference speaker and all round good security guy Jerry Gamblin said: “Hillary Clinton was just working around what she saw as inefficient IT policies. Shadow IT is a huge security risk for every company.” The world has apparently been shocked by the news that...

Read more

It was a case of another month, another flaw revelation this week. Although we have seen zero-days in 2015 primarily affecting Adobe's Flash software, this week a story picked up from the great threats of 2014 with 2015's FREAK. The “Factoring attack on RSA-EXPORT Keys” flaw uses an encryption protocol from the early 1990s to intercept vulnerable clients and servers, and force them to use ‘export-grade’ cryptography, which can then be decrypted. Matthew Green, cryptographer and...

Read more

In our recent article about endpoint security “getting its sexy back”, one point that Neil Campbell, general manager for security at Dimension Data made, which I decided not to include, was about the future of SIEM.   He said: “At the moment, security incident and event management (SIEM) technology is about reporting and not control, and it needs to expand to control and remediation or the point players will disappear as they are looking for...

Read more

In the second and final day here at the Trust in the Digital World conference in Madrid, I have attended a panel debate on the subject of E-Health. With speakers from SAP, ATOS and hospitals in Spain, the concept was mostly on sharing anonymised data for the benefit of research and action, whilst keeping the patient data private. Chair Volkmar Lutz, head of applied research at SAP, said that the view of the sector is that...

Read more

For the first of this series of blogs, I want to focus on the timely concept of trust. Timely for the timing of my travelling from the conference Trust in the Digital World, timely as last week saw the announcement of research that CEOs see cyber security as a third priority, whilst news breaks that some laptop models contained suspicious software that some said was spying on users, and whilst NSA whistle blower Edward Snowden...

Read more

It’s no secret that the data centre industry is evolving rapidly. Large scale, inflexible and expensive physical hosting solutions are no longer common thanks to virtualisation and we’ve all bought into cloud – so today’s forward thinkers are now looking to the Software Defined Data Centre (SDDC) to further transform the way they utilise data resources. This change presents its own interesting challenges for security and SDDC, users need to be aware of the virtues,...

Read more
Page 20 of 37 1 19 20 21 37