Information Security: Harnessing the Overlooked Source for SMB Competitive...
On-Demand Webinar > Watch Now!>>SPONSORED BY: AT&TWatch this FREE on-demand webinar to learn how to make the connections between information security and competitive success for yo...
View Article5 Reasons Why SMBs Can Now Adopt Virtualization
On-Demand Webinar > Watch Now!>> SPONSORED BY: VM6 SoftwareWatch this FREE on-demand webinar now and you’ll discover:Why virtualization is important How to achieve a scala...
View ArticleBoost Performance & Efficiency with Your Data Center Infrastructure
On-Demand Webinar > Watch Now!>>SPONSORED BY: Juniper NetworksWatch this FREE on-demand webinar to learn how you and your company can get started down the road to reach the pinnacle ...
View ArticleNew Microsoft Windows 10 update non-options
We interrupt the security and quantum computing series to bring you news of Microsoft’s latest decision about how your computers will work. (Those wise or lucky enough to use Linux or Macs can sit in...
View ArticleSecurity architecture and quantum computing
Computer and system architectures have security implications. Any new technology needs to be assessed in terms of the risk it may present. A completely new architecture means that there will be new...
View ArticleQuantum computing and access control
The posited pattern matching capabilities of quantum computing may have a couple of different applications in access control. Biometrics would likely benefit from improved abilities to match and...
View ArticleNintendo NX to be a turning point for console gaming?
The last two generations of video game consoles have seen more than their usual share of controversy. Gaming is often a controversial medium socially, ethically and economically, but more recently the...
View ArticleCryptography and quantum computing
Yes, I know I complained about it at the beginning, and I’ve dealt with it elsewhere, but I suppose I really have to address it. (There actually are a number of issues about cryptography and quantum...
View ArticleWhy cyber security doesn’t work
Ilia Kolochenko, CEO and founder of High-Tech Bridge, has an interesting article in CSO Online. It’s worth reading – but I just want to consider the first part here. He examines two sets of figures:...
View ArticlePhysical security and quantum computing
There is probably not a great deal that quantum computing can do to benefit physical security. As previously noted, biometrics may be improved, and these are being increasingly used for physical access...
View ArticleAlas, we can’t rewind America – or can we?
Late last summer my son called me from Seattle to let me know that he would be making a cash deposit to my bank to repay a small loan I had given him over the summer. An hour later, he called back...
View ArticleFacing the Realities of VR and AR
It’s hard to separate important innovations from mere fads. The technology industry can be especially difficult in this regard, constantly throwing out curve-balls that take analysts by surprise. So...
View ArticleFast Incident Response Expected
From time to time, I like to compare and contrast the nascent Information Security profession with more traditional and established occupations. For example when I had lunch with a police officer...
View ArticleYet more VR announcements add confusion to a crowded market
Virtual Reality saw a lot of news in the first week of October, which has done little to clarify or stabilise a marketplace that many already see as confusing and complicated. The first big...
View ArticleTargeted Advertising — a new farce in one Act
Ain’t targeted advertising wonderful? Top of the list of adverts that LinkedIn thinks I might be interested is Dessy. I’ve never heard of Dessy. This is what it offered me: If you actually know me you...
View ArticleStill in Denial of the Tough New Privacy Law GDPR?
This morning GDPR on the news, shared by Rachel Oconnell : Firms Are in Denial About Tough New EU Privacy Law: The world’s toughest privacy law will go into force in Europe 18 months from now, and so...
View ArticleDOS challenges with ITsecurity.co.uk
We were faced with a problem which was at first out of our control: “somebody” is creating, probably without knowing, a denial of service on this website. The consequence was that it was “consuming”...
View ArticleLock up your data – the British IPB is coming
Until a year before the Brexit referendum, I was firmly in favour of the UK leaving the EU. This was because I have zero faith in European politicians. Then I did a 180. This was because I have even...
View ArticleIPB Excuse #73
A new report from the government-backed Get Safe Online organization says that almost £11 billion pounds was lost to fraud and cyber crime in the UK last year. That translates to £210 for everybody...
View ArticleIPB excuse #74
Investigatory Powers Bill (IPB) in the Lords; from Hansard: Baroness Jones of Moulsecoomb (Green Party) The amendment simply requires, first, a threshold of reasonable suspicion that a serious crime...
View Article