Keeping it Simple in IT: Attributes of a Good Identification Management Platform

Why make things easy when it’s so easy to make things hard? This question always enters my head when I think of Identity Management. In two decades of covering the Identify Management industry I have seen one company after another build identity management solutions that either over complicate the experience for the network administrator or […]

Read More…

The Shellshock Q&A

What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]

Read More…

The Shellshock Q&A

What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]

Read More…

The Impact of BYOD on Data Security in Schools

Schools are now more than ever before in possession of a huge amount of personal and sensitive data about both staff and students. This can include data such as exam results or private medical information. Therefore, the importance of securing this data within school IT systems goes without saying; it becomes increasingly critical because many […]

Read More…

The Importance of Password Management for SME’s

In a business environment that is dynamic, constantly evolving and ladled with threats, it is important to ensure all data is kept secure through using some form of password management. Recent, market research has stated that over the next 4-5 years, this requirement for password management is only set to increase because the need to […]

Read More…