Welcome to the new security blog, a group effort from the analyst security team at Bloor.
As my colleague, Peter Cooke, wrote a couple of weeks ago, few businesses in the UK were prepared for the recent wintry conditions and snow, and small businesses in particular found themselves out in the cold. For those of us…
A report by database security firm Imperva has highlighted the most common consumer passwords. The study was based on an analysis of 32 million...
Oracle Corporation has just received regulatory approval from the European Commission for its acquisition of Sun Microsystems.
As computing power has increased, the available horsepower to brute force crack RSA algorithms has grown as well. The most recent announcement, in...
The end of 2009 and the first couple of weeks of 2010 has seen the world of cryptography, and more specifically data encryption, thrust into the...
In the UK, Business Continuity Planning is usually associated with issues such as fire, illness of key staff or a major computer failure.
People are slowly getting their heads around full disk data encryption, but now the focus needs to move onto removable devices. As data proliferates,...
According to the European Network and Information Security Agency, Awareness of the risks and available safeguards is the first line of defence for...
Application whitelisting is gaining a lot more mindshare with security people
Is the growth in IT-related regulations and compliance requirements following a similar trajectory to the evolution of the MOT test?