It’s that time of year again, when the retrospective and predictive blogs come out of the closet, just before the Christmas festivities begin. This time last year, the 2015 predictions were an interesting selection of both consumer and enterprise challenges, with a focus on: Customer Identity Management The start of IoT security awareness Reduced Passwords on […]
January can’t go by without another set of prediction blogs coming our way. Be that for lifestyle, how to lose weight, how to gain weight, how to change our lives and so on. I thought I would join the band wagon and jot down what I think will be the top 5 challenges facing organisations […]
Defence in Depth. Rings of Security. Multi-layered protection. All well known terms when it comes to protecting information assets. Information can generally be accessed in two ways: via a network or straight from the disk. Organisations pay great attention to policies and controls that help protect information both in transit and in situ. Take a […]
A firewall. An aggressive connotation. A wall, made of bricks and cement, literally on fire. As far as protection goes, that is pretty good. Firewalls in a computing and network sense have been around a while, gaining popularity in the late 1980’s when inter-networked computers and later the full blown internet came to the fore. […]