Return to the The Data Chain website homepage

Blog

Archive for November 2011

UK Cyber Security Strategy

28 Nov 2011

Mike Smart, Product and Solutions Director, EMEA at SafeNet comments on how this new strategy will affect small enterprises and refers to the government initiatives to improve online safety and establish ‘kitemarks’ for cyber security software to help consumers and businesses better understand the cyber security solutions available and allow them to make more informed choices.

Read blog post

Three quarters of firms may not fully recover computer systems after an IT faliure

24 Nov 2011

Following a report by IT group EMC which found that three quarters of firms and public sector organisations across nine European countries may not fully recover their computer systems or data after an IT failure. Roger Keenan, managing director of City Lifeline, says:  “It is astonishing how many smaller enterprises do not think about how reliant they are on their computers and their data.  Companies start small and grow.  They begin with a couple of PC’s, then buy a server or two and plug them into the nearest 13 amp socket. Then suddenly, the entire business ends up dependant on the contents of the server-cupboard-under-the-stairs.  This is fine until something happens – a fire, a break-in, or a power failure which crashes the server discs and loses all the information. 

Read blog post

Stolen government certificate signed malware is an upcoming trend, says Imperva

15 Nov 2011

Tal Be’ery, Imperva’s Web Security Research Team Leader on how a governmental digital certificate has been used to sign malware: According to a report by F-Secure, the certificate was used to sign a piece of malware which has been spread through malicious PDF files, dropped after an Acrobat Reader 8 exploit had taken place.

Read blog post

Cloud and the SME

10 Nov 2011

Marcie Terman, Business Development Director at DataFort writes: It seems that for some years, people have been trying to shove the concept of what is now called ‘Cloud Computing’ down our collective throats. Over 10 years ago Steve Jobs tried to herald the days where we would run applications on centralized computer mainframes that offered micro-leasing of software rather than outright purchase.

Read blog post

SSL, the protocol for protecting the internet

03 Nov 2011

Mark Knight, Director, Product Management, at Thales e-Security writes: It's good news that Google have announced their continued expansion of the use of SSL which means that certain Google searches (and the results) will be encrypted. There's already been pressure to turn on encryption at corporate and domestic WiFi hotspots to prevent theft of passwords and other information by sniffers on the local hotspot but it must be remembered that this still only protects communication between the user's computer or phone and WiFi access point. Traffic flowing on the wired network across the various hops and interconnection points that make up the internet to get to websites such as Google is typically unencrypted. The solution is for web site operators to deploy technologies like SSL to provide end to end encryption from the consumer all the way back to their site. It's good to see that https (aka SSL), is now gradually replacing http, even for free services like Google search.

Read blog post
Broadgroup-Skyscraper

Mailing list




Copyright 2010-14 The Data Chain Website design and management by CBJ Digital Ltd.