Bloor Alumni
Research from Nigel Stanley
- Managing Cyber Business Risk on 28th April, 2014
- Infosec: Jailbroken devices are a threat to the network on 8th May, 2012
- SC Magazine Virtual Summit – Lock Down the Mobile Front on 4th May, 2012
- Keynote Panel at InfoSec 2012 – Smart Devices on 19th April, 2012
- Enterprise Readiness of Consumer Mobile Platforms on 17th April, 2012
- Google Android vs. Windows Phone 7.0 – A Comparative Analysis of Smartphone Security on 17th April, 2012
- Security at Mobile World Congress 2012 on 5th March, 2012
- RSA Cybercrime Trends Report 2012 on 13th February, 2012
- Nigel Stanley at Mobile World Congress Security Forum on 13th February, 2012
- Intellectual Property Theft: Protecting Data Against Cyber Criminals on 19th December, 2011
- Now hold your breath – the Olympic year is nearly upon us on 16th December, 2011
- BSIMM Version 3 – A Joy to Behold! on 3rd October, 2011
- The Technology Behind Cyberterrorism on 5th September, 2011
- Cyber Threats to National Security on 2nd August, 2011
- Nigel Stanley Presents at Jane’s Cyberwar Webinar on 20th June, 2011
- Voice Data Security on 27th May, 2011
- Secure Systems Development Conference – A Must See! on 27th April, 2011
- Mobile Phone Voice Protection with Morrigan Secure Application on 27th April, 2011
- BBC Interviews Nigel Stanley on Phone Hacking on 26th April, 2011
- BBC Story on Bloor Research into Jihadists use of Smartphones on 26th April, 2011
- Mobile Phone Hacking at Counter Terrorism Expo, London, April 2011 on 13th April, 2011
- What is the most secure smartphone? on 9th March, 2011
- Smartphone and mobile (cell) phone security on 22nd February, 2011
- McAfee and Wind River – Blown Together Nicely on 21st February, 2011
- The Smartphone: a real bug in your bed (3) on 18th February, 2011
- The Smartphone: a real bug in your bed (2) on 16th February, 2011
- The Smartphone: a real bug in your bed on 14th February, 2011
- Sound Trojan for Smartphones on 11th February, 2011
- Smartphone and Mobile Security – 2011 will be an Historical Year on 21st January, 2011
- Consumerisation is a challenge for IT managers. Is the smartphone to blame? on 13th January, 2011
- Are Smartphone users more dippy than most? on 10th January, 2011
- Making compliance real for those in the trenches on 20th December, 2010
- Cybercrime, Cyberwars, Cyberterrorism and Hacktivism – Part 3 on 17th December, 2010
- Cybercrime, Cyberwars, Cyberterrorism and Hacktivism – Part 2 on 15th December, 2010
- Cybercrime, Cyberwars, Cyberterrorism and Hacktivism on 14th December, 2010
- Cybercrime, Cyberwars, Cyberterrorism and Hacktivism on 14th December, 2010
- Cybercrime, Cyberwars, Cyberterrorism and Hacktivism – Part 1 on 13th December, 2010
- EU Compliance and Regulations on 26th November, 2010
- Sky News, Stuxnet and the End of the World on 26th November, 2010
- The Real Cost of a Data Breach – InfoSecurity Magazine US Virtual Conference Presentation on 5th November, 2010
- Third Annual Paradox Report – Security still an issue for mid-sized organisations on 27th October, 2010
- Is Symantec on track? Probably. Will it be successful? Maybe on 7th October, 2010
- Google Android apps found to be sharing data on 1st October, 2010
- The Ongoing Security Paradox on 30th September, 2010
- Application Code Security Testing in the Cloud on 10th September, 2010
- Application Code Security on 9th September, 2010
- No Software. No Source Code. No Problem. on 7th September, 2010
- Cell Phone Hacking Attacks – A Real and Present Danger (Part 4) on 25th August, 2010
- Cell Phone Hacking Attacks – A Real and Present Danger (Part 3) on 18th August, 2010
- The BBC puts Smartphone security on test on 10th August, 2010
- UAE, Saudi and the BlackBerry Security Conundrum on 9th August, 2010
- Cell Phone Hacking Attacks – A Real and Present Danger (Part 2) on 4th August, 2010
- Voice Data Security on 2nd August, 2010
- Interested in Cell (Mobile) Phone Hacking? on 30th July, 2010
- US Brands Targeted in Online Attacks on 29th July, 2010
- Cell Phone Hacking Attacks – A Real and Present Danger (Part 1) on 28th July, 2010
- Computer Crime Gets Sexy TV Show on 9th July, 2010
- Finally a Decent Use of Cloud Computing: Software Security on 11th June, 2010
- Finally a Decent Use of Cloud Computing: Software Security on 8th June, 2010
- Building Security In Maturity Model gets an Update on 12th May, 2010
- Time to hug a PGP employee? on 30th April, 2010
- Mobile Phone Hacking for on 21st April, 2010
- InfoSec 2010 – A “must visit” show on 20th April, 2010
- Email Leaks 10,000 Names from Police Data Check on 20th April, 2010
- Practical Steps to Ensure GCSX Code of Connection Compliance and Beyond on 28th March, 2010
- Database Activity Monitoring Part 5 – A Brief for Business Decision Makers on 17th March, 2010
- Battery Charger Beats Security on 15th March, 2010
- The Business Case for Database Activity Monitoring? on 15th March, 2010
- The Craziness of Passwords on 15th March, 2010
- Database Activity Monitoring Part 4 – Compliance and Technical Architecture on 10th March, 2010
- Database Activity Monitoring Part 3 – Other Common Attacks on 3rd March, 2010
- Database Activity Monitoring on 26th February, 2010
- Database Activity Monitoring Part 2 – SQL Injection Attacks on 24th February, 2010
- Database Activity Monitoring Part 1 – An Introduction on 16th February, 2010
- Conficker grounds police checks on 5th February, 2010
- The Security Paradox on 5th February, 2010
- EU Compliance and Regulations on 3rd February, 2010
- The strategic use of removable media on 27th January, 2010
- Common passwords 123456 and qwerty finally exposed on 22nd January, 2010
- Cracking a 768-bit RSA key on 19th January, 2010
- The Security Paradox on 18th January, 2010
- Encryption gets a Battering – Part 2, RSA on 18th January, 2010
- ICO Grows some Teeth on 18th January, 2010
- Mobile Phone Secret codes being hacked on 15th January, 2010
- DDOS without the D. Are we doomed then? on 15th January, 2010
- The Security Paradox on 14th January, 2010
- Encryption gets a Battering – Part 1, Mobile Phones on 14th January, 2010
- Removable media – the next encryption frontier? on 13th January, 2010
- The strategic use of removable media on 5th January, 2010
- Application Whitelisting – Worth a look? on 8th December, 2009
- Telling the Information Security Story on 25th November, 2009
- Joining the Dots Between Security and Compliance on 20th November, 2009
- Are IT audits like an MOT test for a car? on 17th November, 2009
- Interested in application (code) security? on 13th November, 2009
- Intrusion Prevention, Detection and Unified Threat Management on 4th November, 2009
- Database Key Management – an Introduction on 3rd November, 2009
- Is Database Encryption Worth it? on 14th October, 2009
- Symantec – is our future yellow? on 14th October, 2009
- Public Sector Data Breaches – Where do we go from here? on 29th September, 2009
- Generating Maximum Value from your IT Security Spend – An Analyst’s Perspective on 29th September, 2009
- And Fran makes the complete set … on 29th September, 2009
- What is SQL Injection? Understanding this Important Threat Vector on 18th September, 2009
- Trustwave Acquires Vericept on 15th September, 2009
- Managing Security Risk and Compliance on 2nd September, 2009
- McAfee Names Dangerous Celebs on 26th August, 2009
- Cloud Computing – looking before you leap on 25th August, 2009
- Cloud computing and data security on 16th August, 2009
- Expert loses laptop. Is no one immune? on 6th August, 2009
- Infosecurity Magazine Virtual Conference – A Naming and Shaming Fiesta! on 4th August, 2009
- Some NHS trusts have suffered badly due to poor malware management on 14th July, 2009
- The Anti-Malware Market – A Quick Update on 13th July, 2009
- Baitware gets better – we should all be vigilant on 7th July, 2009
- Plods Plod the Perilous Wikipedia Path on 3rd July, 2009
- UK Government Data Handling – Some Thoughts on 1st July, 2009
- Wacko Jacko and the Masters of Spam on 30th June, 2009
- The Anti-Malware Market – A Quick Update on 25th June, 2009
- Security Industry Squeezes Windows XP for More Bad News on 27th May, 2009
- Verizon Data Incident Report – Peeling Back the Covers on 27th May, 2009
- Getting to Grips with Compliance – Some Notes from the Front Line on 22nd April, 2009
- Data Loss Prevention – A Market Update from Bloor Research on 2nd April, 2009
- Enterprise Data Protection – A Market Update from Bloor Research on 31st March, 2009
- Data Encryption on 26th March, 2009
- Data Leak Prevention on 26th March, 2009
- Enterprise Data Protection on 26th March, 2009
- EU compliance and regulations for the IT security professional on 10th March, 2009
- Asia Pacific & Japan – Compliance and Regulations for the IT professional on 9th March, 2009
- Data Encryption – A Market Update from Bloor Research on 6th March, 2009
- Managing Security Risk and Compliance on 27th February, 2009
- Coverity looks to the future on 12th February, 2009
- CA to acquire DLP vendor Orchestria on 6th January, 2009
- CA – positive as ever on 25th November, 2008
- Protecting Enterprise Data on the Endpoint on 10th November, 2008
- The World of Application Security on 23rd October, 2008
- Application Security on 21st October, 2008
- Symantec Move up The Scale, but can they Ring the Bell? on 14th October, 2008
- IBM does Security rather well on 10th October, 2008
- EU Compliance and Regulations for the IT Professional on 9th October, 2008
- When Credit Crunch = Data Security Crunch on 19th September, 2008
- PGP and IBM Supporting Bletchley Park on 11th September, 2008
- Protecting Company Information – Why, How and What if? on 9th September, 2008
- Finjan speaks cybercrime on 13th August, 2008
- Sophos to buy Utimaco on 8th August, 2008
- Open Source Code = Insecure Code? on 5th August, 2008
- The importance of saving Bletchley Park on 25th July, 2008
- Are Tricerion revolutionising passwords? on 3rd July, 2008
- McAfee Enterprise Extras on 25th June, 2008
- IBM uses Vormetric Products – Should You? on 18th June, 2008
- Endpoint Data Protection – A Market Update on 6th June, 2008
- Endpoint Data Protection on 4th June, 2008
- Enterprise Data Protection – A Reality Today? on 23rd April, 2008
- Enterprise Data Protection on 22nd April, 2008
- Data Leak Prevention on 18th April, 2008
- Data Encryption on 18th April, 2008
- Web Transactions and Device Reputation – iovation Lead the Innovation on 28th March, 2008
- Protecting Enterprise Data on the Endpoint on 6th March, 2008
- The real cost of data loss is down to butterflies on 4th March, 2008
- IBM Optim and Data De-Identification on 7th February, 2008
- Ounce Labs weighs into rogue code on 21st January, 2008
- Glengarry Glen Ross – Old Fashioned Inside Threat on 14th January, 2008
- Symantec Spammers Rock ‘n’ Roll on 18th December, 2007
- McAfee, ScanAlert and a Happy Christmas on 17th December, 2007
- Pain, Angst and Time – the real cost of a data breach. on 3rd December, 2007
- The strategic importance of email encryption on 23rd November, 2007
- Crap Government IT Rules OK? Oh well, pass the biscuits. on 20th November, 2007
- Protegrity – offering the best of both worlds? on 5th November, 2007
- Data Level Protection and Loss Prevention – the final frontier? on 29th October, 2007
- Of Vista, RSA and Polite Guffaws on 25th October, 2007
- Data Loss Prevention – a Wise Investment? on 9th October, 2007
- Lumension – shining a light? on 20th September, 2007
- Social Networking Sites and the Delicate Problem of Saying No on 19th September, 2007
- The Importance of “Whole Journey” Email Encryption on 14th September, 2007
- Policing the police – managing PCI vendors bull**** on 21st August, 2007
- AccessStick: delivering access on the move on 6th August, 2007
- DBA snaffles data – the Inside Threat continues on 5th July, 2007
- Qualys: When compliance rules finally meet technology on 28th June, 2007
- Workshare – Creating the Most Secure PDF? on 25th June, 2007
- PatchLink Corporation to Acquire SecureWave – A Marriage Made in Heaven? on 19th June, 2007
- Mirapoint – the Appliance of Security? on 15th June, 2007
- Computer Associates – has the worm turned? on 1st June, 2007
- Software Development and the Rise of the Alpha Techie on 29th May, 2007
- The Inside Threat on 20th May, 2007
- InfoSec – the final curtain on 26th April, 2007
- InfoSec Show or DataSec Show? on 26th April, 2007
- InfoSec Show Day 1 Scores a Hit on 25th April, 2007
- Inside Sex Show on 19th April, 2007
- My PC acted like a 2 year old toddler on 11th April, 2007
- Vista? Just say no? on 4th April, 2007
- At the tone leave your virus on 16th February, 2007
- Cybercrime? Forget it on 7th February, 2007
- Of Spooks, Security and Vista on 17th January, 2007
- Sophos, SurfControl and the WS1000 on 9th January, 2007
- Webroot: Enhancing Security for Small Businesses on 13th December, 2006
- Of Open Source, Security and the Naughty Stair on 11th December, 2006
- PC Plod’s PCs Plundered on 22nd November, 2006
- Your life on a USB Key Drive? on 15th November, 2006
- Business Security – Convince My Boss on 6th November, 2006
- Am I paranoid? on 2nd November, 2006
- Fred and Freda – you are the weakest link. Goodbye. on 27th October, 2006
- IE 7.0 – Flawed or Fine? on 24th October, 2006
- Is Microsoft Security Getting Better? on 18th October, 2006
- Support Forums, Hackers and Security on 16th October, 2006
- ArcSight and Insider (or Inside?) Threat Management on 10th October, 2006
- Data Theft, Indian Style on 9th October, 2006
- Scrap Cars and Exploits on 4th October, 2006
- ChangeBase Patch Management – My Involvement on 4th October, 2006
- IT Security is Complicated. Bears do what in the Woods? on 3rd October, 2006
- Securing the Business Infrastructure and the Bloor Assured Business on 1st October, 2006
- Is Internet Banking Secure? on 29th September, 2006
- Securing the Remote End Point in an Assured Business on 29th September, 2006
- Firefox 2 Nearly Ready on 29th September, 2006
- Some Web Sites are Bad on 25th September, 2006
- CipherTrust and Secure Computing – A Marriage made in Heaven? on 22nd September, 2006
- Great Government Website – Shock! Horror! on 22nd September, 2006
- Micro Security and the Assured Business on 20th September, 2006
- Zotob Gang Banged Up on 19th September, 2006
- Hackers Grow Up on 19th September, 2006
- From Micro to Macro Security on 18th September, 2006
- The Assured Business and Database Assurance Appliances on 15th September, 2006
- Encryption and the Assured Business. Do it or Die. on 14th September, 2006
- Blind Patch Ballet on 13th September, 2006
- Products, Politics and IT Security – Winning the day for the Assured Business on 12th September, 2006
- Dump Diving Anyone? on 11th September, 2006
- Paying for Phishing on 11th September, 2006
- Arnie Sticks it to the Users on 8th September, 2006
- Test your Phishing IQ Online on 8th September, 2006
- Another day, Another Site Hack on 8th September, 2006
- Oh No, SMiSh Smash Time! on 8th September, 2006
- My Numbers Up, with Pineapple on Top on 8th September, 2006
- Have ActivIdentity Cracked the ID Issue? on 23rd August, 2006
- Kicking down the CxO Door on 17th August, 2006