Apple is often criticised on how they try to control what happens to their products. But one company has been strictly controlling what happens to its products for much longer: Microsoft. Microsoft keeps very strict control on what gets delivered via...
Read moreAll posts for category Security
Cyberwar with Stuxnet - This time it's personal
This is a guest blog by Maarten Oosterink. Maarten is a managing consultant within Capgemini working on IT security. The IT security industry is buzzing about cyberwar. And for good reason, because it’s real and it’s happening. The most widely...
Read moreIT Security is Hot & Cloudy!
Last Wednesday's BCS event on IT security certainly made that point on many different levels. If I was a betting man, I'd wager that the IT security industry is on the brink of a major revolution, on the back of that vague and fluffy thing called the...
Read moreJericho Forum launches Self Assessment Service
Fans of de-perimeterised security may be interested to know that the Jericho Forum has just launched a self-assessment service. The service allows user organisations, and vendors, to mark themselves against the Jericho Forum's 11 commandments and to...
Read moreWhat's new about cloud security?
I'm being asked quite a lot at the moment about cloud security. Is it possible to secure the cloud, is there anything different about cloud security? I believe that about 70% of cloud security is just good security and you would need to do it...
Read moreWhy do I Polish my Shoes - Or, Welcome to the Reputation Society
I've published several blog entries over the last few months about the Jericho Forum's Collaboration Oriented Architecture and its associated contract lifecycle. The contract lifecycle describes how the participants in a contract always go through a...
Read more4 Myths about blocking Internet access in the enterprise
Some enterprises think that blocking Internet access for their employees is the solution to many of their issues. They think that productivity will be increased, costs can be saved, less security and legal issues will occur and, since the rise of...
Read moreDe-perimeterised Security and the Collaboration Oriented Architecture
The Jericho Forum has been pointing out the flaws in a perimeter-based approach to security for some years now. The message is gaining acceptance, with many products and companies claiming to be 'Jericho compliant', whatever that means. But what...
Read morefacebook://
Having 250 million members, Facebook is huge. If it was a country it would be the fourth country in the world measured on population size (US is third with 300 million, India and China are the numbers 2 and 1 with more than one billion people). It is...
Read moreMoving from service to infrastructure
Are you using a certain service? Do not judge it by its cover. Sometimes the medium someone is using for a service will become some kind of personification of the service. Like for some Outlook is equal to email and TweetDeck for Twitter. For example...
Read more



By
By
By 














