Recent Blog Posts
Endpoint security
Quocirca Insights
Confidence in print security drops and data breach costs rise
Quocirca 14 Dec 2020As cyberattacks continue to increase, capitalising on the new vulnerabilities of remote working, securing the print infrastructure – across the office and home environments – must be a strategic ...
Write side up - by Freeform Dynamics
The authentication arms race continues
Freeform Dynamics 26 Nov 2020This week we are heading back to 2006, when we reported on that sadly-perennial favourite: IT access security, and more specifically, Managing Access Securely. As our contribution to the bit of fun ...
“NHS” is the UK’s most trusted brand. Until recently it was one of the least protected/secure. There have been significant improvements but, as a result of Covid, impersonating the NHS now comes ...
In this guest blog post, Satyam Vaghani VP/GM, IoT & AI, Nutanix discusses the way IT will need to change to support edge computing. The rise of the edge will require a redistribution of the ...
Quocirca Insights
Five ways a managed print service can support cyber resilience
Quocirca 04 Oct 2019As IoT devices, smart MFPs are susceptible to the growing threat of attempts to implant malware, recruit to botnets (to help perpetrate DDoS attacks), as well as potentially providing an open ...
Fintech makes the world go around
UK businesses at risk due to PSD2 security standard myths re-emerging
Emea Content Editor, Computer Weekly 22 Aug 2019UK businesses could put themselves at risk because of myths surrounding the PSD2 security standard
Fintech makes the world go around
Still work to be done securing Open Banking as PSD2 deadline looms
Emea Content Editor, Computer Weekly 21 Aug 2019Banks and retailers have work to do to ensure that open banking and PSD2 don't open doors for fraudsters
Fintech makes the world go around
PSD2 creates more potential entry points for fraudsters
Emea Content Editor, Computer Weekly 20 Aug 2019PSD2 widens the target for fraudsters preying on consumers through social engineering and other non technical attacks
Data breaches are rarely out of the headlines and compliance pressure, such as the introduction of GDPR, means security remains high on the corporate agenda. Cyber threats and data breaches are no ...
Our new CISO has just issued a warning across the company. He's going to blame staff for any blunders. And he's going to make sure they NEVER do it again...
By Kimberly Chua Mobile app users in developing Asia-Pacific (APAC) countries prefer convenience over security, signaling a potential rift between companies and users, a new F5 Networks study has ...
Networks Generation
IT On A Budget? Still Plenty Of Investment Money Around...
Broadband Testing 29 Jun 2018IT is often two-faced and never more so than when it comes to the financial health of the industry. Speak to one set and they'll tell you how tight it is, scrapping for every penny of profit, and ...
Write side up - by Freeform Dynamics
Your PC is rooted and jailbroken: deal with it!
Freeform Dynamics 18 Jun 2018One of the defining characteristics of the modern digital workplace is a Windows PC on every desk and a smartphone in every pocket. The ability to centrally discover, provision, deploy, update, and ...
Fintech makes the world go around
Fintech professional’s tech predictions: 2 - Smart meter breaches
Emea Content Editor, Computer Weekly 28 Mar 2018Energy smart meters will increasingly be targets for cyber attacks
In some ways the Meltdown and Spectre flaws represent a risk that goes to the very heart of computing. This microprocessor flaw has resulted in major network, server, PC and mobile hardware firms ...
Networks Generation
Hold The Front Page: Common Sense Prevails In IT Security Shock!
Broadband Testing 09 Jan 2018IT is overloaded with slick marketing terms that have little or no substance behind them – the classic “solution searching for a problem” scenario but… just occasionally the complete opposite prevails
As IT attack surfaces are extended through the proliferation of IoT devices, organisations need to make sure their security systems are co-ordinated for the challenge. This is especially true for ...
When IT Meets Politics
Trolls driving women off the web (and turning girls off IT)
Winsafe Ltd 29 Jun 2017Boys and older trolls are elbowing girls and older women off the Internet, just as they used to elbow them off computers in schools in the 1980s. During the first, and most successful, campaign to ...
Misspellings, suspicious hyperlinks, abnormal sender address, no attempt at personalisation. The classic signs of a phishing email? Or a botched marketing email from IBM promoting — wait for it — a ...
Donald Trump's counselor and strategist Kellyanne Conway caused uproar online this week when she implied that former president Barack Obama may have used a microwave oven to spy on her boss. Conway ...
Amidst the proliferation of Internet of Things (IoT) endpoints, the cybersecurity threat landscape has expanded to every mobile, smart and cloud-enabled device on the network. This threatens the ...
Wearables, smart homes, smart buildings, smart cities and autonomous vehicles are among the technological breakthroughs that are starting to gain traction. The Consumer Electronics Show (CES) in ...
When IT Meets Politics
The first NCSC enquiry (Nativity Child Safety Consequences)
Winsafe Ltd 16 Dec 2016Have an off-line Christmas and a thoughtful New Year
Research commissioned by Quocirca in July 2016, as background to its Reference Architecture for the IoE (Internet of Everything), shows that most businesses in the UK and Germany believe the ...
Does blockchain technology hold promise for print manufacturers in the IoT world? The Internet of Things (IoT) is a world of connected devices embedded with software and network connectivity, that ...
Quocirca Insights
The shape of things to come – advanced networking security for the IoT
24 Oct 2016Many organisations are having to rethink network security to support Internet of Things (IoT) deployments. This includes being ability to continuously monitor devices attaching to networks and ...
Networks Generation
Secure at the cloud - no, do it at the endpoint - Oh now, this is so confusing... Or is it?
Broadband Testing 05 Jul 2016Security, for a decade or so, didn't see much in the way of true change - yes, firewalls got smarter, likewise AV products (well, some anyway), IDS became IPS so it could actually stop something ...
In this day and age, it's not just the techie guy at the helpdesk who know what the numbers and dots posted on the bus mean. Clearly, the bus driver here is on the game. And most Y-gens will ...