IT-Analysis.com
IT-Analysis.com Logo
Business Issues Channels Enterprise Services SME Technology
Module Header
Louella FernandesLouella Fernandes
Louella Fernandes
11th April - Managed Print Services: Are SMBs Ready?
Louella FernandesLouella Fernandes
Louella Fernandes
11th April - The Managed Print Services (MPS) Opportunity for SMBs
Simon HollowayThe Holloway Angle
Simon Holloway
11th April - Intellinote - capture anything!
David NorfolkThe Norfolk Punt
David Norfolk
11th April - On the road to Morocco
Philip HowardBloor IM Blog
Philip Howard
10th April - Attunity Gold Client
Module Header
SITS14 - The Service Desk & IT Support Show
29th April - 30th April
London, United Kingdom

View More Events

Bloor Security Blog

Welcome to the Bloor Security Blog blog on IT-Analysis.com. Simply click on one of the links from the list below, or delve into the Archives for older material.


Recent Blog Posts

Fran Howarth, Bloor Research | 2nd April '14
Bit9 and Carbon Black announced recently that the two companies were to merge and, for the time being at least, will be known as Bit9 + Carbon Black in order to signal the importance of the two brands. On the back of this news, the newly combined...
 
Fran Howarth, Bloor Research | 24th March '14
The need to build or rebuild trust, ideological shifts pointing towards cyber war, technology touching all parts of our lives, cultural shifts spawning cyber activism, digital natives and the democratisation of technology in favour of less developed...
 
Fran Howarth, Bloor Research | 17th March '14
Insiders may not be the source of the majority of threats organisations face, but any malicious activity, or even inadvertent mistakes that they make, can be among the most damaging—and especially those with elevated privileges to access sensitive...
 
Fran Howarth, Bloor Research | 3rd February '14
Passwords have had their day. With so many to remember for each application that we access and each device that we use, the majority of users resort to insecure practices in order to remember them. Even when we do remember them, exploits such as...
 
Fran Howarth, Bloor Research | 29th January '14
Today’s threat landscape is complex and increasingly sophisticated. Opportunistic attacks still occur and are a menace, but targeted attacks are a rapidly growing threat. They are often launched by sophisticated and professional criminal...
 
Fran Howarth, Bloor Research | 15th October '13
Cyber threats are so common and insidious today that it's a case of when, not if, your network has been breached. And it is highly likely that you don't even know it. Research conducted earlier in 2013, in conjunction with the Infosecurity...
 
Fran Howarth, Bloor Research | 10th September '13
Network access control (NAC) technologies burst onto the scene in 2005 with the promise of controlling which users and endpoint devices can connect to the network and what they can do there according to policy. They are part of the fight to control...
 
Fran Howarth, Bloor Research | 6th August '13
Following on from a recent posting on the importance of APIs for enabling the extended enterprise, I came across an interesting graphic from Layer 7, now owned by CA Technologies, which was the vendor featured in the previous posting. The data in...
 
Fran Howarth, Bloor Research | 2nd August '13
An API (application programming interface) is a programming language construct that enables two applications to communicate or, as the acronym suggests, interface with each other. As such, they are a common boundary that facilitates integration...
 
Fran Howarth, Bloor Research | 25th July '13
For many years, usage of Apple's Mac products in organisations was limited. Certain industries, such as publishing, advertising, entertainment and education were relatively heavy users of Macs, but penetration remained low in many other industries....
 
Fran Howarth, Bloor Research | 24th July '13
SailPoint Technologies has just announced the availability of a new cloud-based identity management as a service suite - SailPoint IdentityNow. Sold on a subscription basis, the components of the suite that are initially available are single...
 
Fran Howarth, Bloor Research | 19th July '13
Founded some 11 years ago, Ping Identity has been one of the pioneers of the identity management as a service space. The idea behind such services is to extend identity management capabilities beyond enterprise applications provisioned in-house and...
 
Fran Howarth, Bloor Research | 9th July '13
Announced today, RSA Security has acquired Aveksa, a business-driven identity and access management vendor. The term business-driven refers to Aveksa's view that identity and access governance decisions are better taken by business owners, rather...
 
Fran Howarth, Bloor Research | 25th June '13
UK-based CertiVox has recently released a service that it believes will revolutionise authentication over the internet. It is an open-source two-factor authentication service that works with any HTML 5 browser or app. CertiVox is touting the...
 
Fran Howarth, Bloor Research | 4th June '13
The attacks being experienced today on computer networks are increasingly targeted and sophisticated. Attackers carefully research their victims and increasingly write one-off exploits that are highly unlikely to be caught using traditional rules...
 
Fran Howarth, Bloor Research | 28th May '13
The new mantra today is that it is not if your organisation will suffer a security breach, but when. In a recent survey released during Infosec Europe 2013, 93% of large organisations reported that they had been breached in the past year, as did 87%...
 
Fran Howarth, Bloor Research | 30th April '13
Research conducted by Pricewaterhouse Coopers found that, in 2006, just 22% of more than 7,000 organisations surveyed had a CISO or equivalent function, but that proportion had grown to more than 80% by 2011. However, according to a recent report by...
 
Fran Howarth, Bloor Research | 24th December '12
One of today's buzzwords is big data. Volumes of information generated are increasing rapidly, driven in part by increased take up of mobile technologies and the growing number and range of machine-to-machine communications as ever more equipment,...
 
Fran Howarth, Bloor Research | 3rd December '12
The threats we face today are no longer smash-and-grab raids, looking for instant gain. Rather, perpetrators are looking to get a deep foothold into the network. They use subterfuge to trick their way into the organisation that is being specifically...
 
Fran Howarth, Bloor Research | 25th October '12
The technology landscape is changing fast, bringing much disruptive change that provides organisations with new ways to streamline their businesses, reach out to customers more effectively and keep their workers productive. Among the hottest trends...
 
Fran Howarth, Bloor Research | 22nd October '12
Among the many challenges that telecommunications providers face are the need to transform and consolidate their businesses. They need to adopt new business models that allow them to move away from commodity services such as voice traffic where...
 
Fran Howarth, Bloor Research | 17th September '12
Trust is essential for building a sustainable business. Security is essential for building trust. To build trust in electronic networks, security needs to be built into a suitable framework, rather than being bolted on in a piecemeal fashion. The...
 
Fran Howarth, Bloor Research | 26th July '12
According to the US government, the strength and vitality of our economy, infrastructure, public safety and national security have been built on the foundation of cyberspace. The McKinsey Global Institute recently published a study that aimed to...
 
Fran Howarth, Bloor Research | 30th April '12
Emails are essential business communications and collaboration tools and the vast majority of business information is, at some point of its lifecycle, communicated via emails and their attachments. Even though the use of other forms of...

Advertisement



Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761
Email: