Skip to main content
Main Menu
  • Come spy with me: drones and info-sec

    UASs (unmanned aircraft system) or drones, as they are known in common rather than legal parlance, can easily cross physical barriers. As drone use increases, both for commercial applications and for recreational purposes, new challenges are emerging with regard to privacy and information security.

    Read Blog
  • SD-WAN: Take a good look at the outliers

    Is management cutting your IT budget in 2017?

    From recent conversations with UK service providers, CIOs and telco analysts, the general perception is that enterprise IT budgets will face 30% cut in their operating expenses in 2017, counter balanced by a 20% increase in innovation spending. Such budget realignments require radical rethinking and can certainly not be achieved unless ops and innovation go hand in hand.

    SDN and SD-WAN into the breach

    Read Blog
  • Working with giants – 25 years of IT security

    The IT security industry as we know it could be said to be enjoying its 25 anniversary. Of course, there has been a need for IT security for longer than this, but the release of HTML and the birth of the web in 1991, which saw widespread internet use take-off, was a game changer. Device-based security measures from existing anti-virus vendors like Norton (acquired by Symantec in 1990) and McAfee (acquired by Intel in 2011) had to be adapted from monitoring the occasional arrival of new content via portable media to the internet as a major new threat source.

    Read Blog
  • NetApp/SolidFire – a new powerhouse, or straws grasping at each other?

    fas (3)_480x384In December 2015, NetApp made its bid for SolidFire at $870m.

    Read Blog
  • Updates, updates – hares and tortoises in the software vulnerability race

    To penetrate a target organisation’s IT systems hackers often make use of vulnerabilities in application and/or infrastructure software. Quocirca research published in 2015 (sponsored by Trend Micro) shows that scanning for software vulnerabilities is a high priority for European organisations in the on-going battle against cybercrime.

    Read Blog
  • IT Untethered – How Wireless is Changing the World

    Not much more than 20 years ago, nearly all local area networks (LAN) involved cables. There had been a few pioneering efforts to eliminate the wires but for most it was still a wired world. With the advent of client-server computing and the need for access to IT being required by more and more employees this was becoming a problem. Furthermore, smaller computers meant more mobility, devices were starting to move with their users.

    Read Blog
  • Before & during targeted attacks – the 2016 Eskenzi IT Security Analyst & CISO Forum

    A recent Quocirca report, The trouble at your door, sponsored by Trend Micro, looked at the scale of targeted attacks faced by UK and European businesses and the before, during and after measures in place to mitigate such attacks. Trend Micro has plenty of its own products on offer, not least its recently upgraded Hybrid Cloud Security offering.

    Read Blog
  • Before and during targeted attacks - a report from the 2016 Eskenzi PR IT Security Analyst and CISO Forum

    A recent Quocirca report, The trouble at your door, sponsored by Trend Micro, looked at the scale of targeted attacks faced by UK and European businesses and the before, during and after measures in place to mitigate such attacks. Trend Micro has plenty of its own products on offer, not least its recently upgraded Hybrid Cloud Security offering. However, last week, Quocirca got a chance to

    Read Blog
  • Your money or your data? Mitigating ransomware with Dropbox

    Windows 10 has an unnerving habit of throwing up a screen following certain updates that says “all your files are right where you left them“. Quocirca has not been alone on first seeing this, in thinking it might be a ransomware message. Microsoft has said it is planning to change the alert following user complaints.

    Read Blog

Pages