Articles by Bob Tarzey


April 28, 2014

By Bob Tarzey

In an ideal world threat intelligence should prevent IT security incidents from occurring in the first place; however, in reality incidents are inevitable, often with associated data breaches.


March 27, 2014

By Bob Tarzey

The best time to eliminate software bugs is early on in the application development lifecycle. Doing so helps ensure better code is released in the first place; it will be less vulnerable to attack and more secure. But, how do you get closer to achieving the ultimate goal of bug free code that delivers to requirements?


March 4, 2014

By Bob Tarzey

Web users rely on SSL (secure sockets layer) on a regular basis without having to know what it is or even it is securing their transactions and data in the background. Without SSL there would have been no Internet banking, no e-commerce, no Internet revolution.


February 26, 2014

By Bob Tarzey

Sometimes technology areas that once seem distinct converge. Indeed there was a time when the term convergence was used, without qualification, to refer to the coming together of IT and traditional telephone networks, something that for many is now just an accepted reality. 


February 3, 2014

By Bob Tarzey

As various pundits have reeled off their security advice for 2014 many have listed the growing threat of denial of service (DoS) attacks as something to look out for. 

They are probably right to do so; two recent publications, the Arbor Worldwide Infrastructure Security Report (WISR) and the Prolexic Global DDoS Attack Report, both show that the number, size, sophistication and impact of DoS attacks continue to increase. 


January 8, 2014

By Bob Tarzey

Embedded in all Microsoft Windows server operating systems and in its Azure platform as a service offering is Active Directory; a store of information about all the objects and their attributes that are active within a given Windows network domain. This includes printers, network devices, hardware servers and, most importantly, users.


January 2, 2014

By Bob Tarzey

Any organization that has not already started to think about the impact mobility has on IT security should start doing so this year. 63% of businesses provide formal access to some of their business applications to mobile users, a Quocirca research report "Digital Identities and the Open Business," showed. 


November 29, 2013

By Bob Tarzey

The two biggest concerns organizations have when considering the use of cloud-based services are the safety of personal data and complying with data protection laws (see complimentary Quocirca report, “The adoption of cloud based services,” downloadable here). The report shows that these are issues that those recognizing the benefits of such services overcome by investing in security technology.


October 22, 2013

By Bob Tarzey

No business can avoid “the cloud.” Some embrace cloud based services with enthusiasm as a formal way of delivering all or part of a given organization’s IT requirements, whilst others grudgingly accept them because it is near impossible to stop individual users or lines of business from building them in to business processes.

A recent Quocirca research report – “The adoption of cloud based services” – exposed some striking differences between those with attitudes that lie at these two ends of the spectrum with regard to attitude to cloud based services.


Page 2 of 2 : First   1 2 Last

The Human Factor: Gain new insight into the ways attackers exploit end-users' psychology​​

About Security Current | Privacy Policy | Subscribe to our newsletter