Stuart Winter-Tear Archive
The ‘problem with passwords’ is well documented and grows more acute as traditional network boundaries are blurred with the adoption of mobile devices. As a result, the imperative to counter user impersonation and prove authentication on endpoint devices has never …
With Grinch-like predictability, DDoS attacks have almost become part of the Christmas and New Year festive period. Last year saw Microsoft and Sony gaming networks swamped and taken offline much to the chagrin of players worldwide. I’m not entirely sure …
Competent IT network admins have upped their security game. They’re constantly on the lookout for news on vulnerabilities, implementing necessary vendor patches and updates with gusto, and even scanning their own systems for open doorways and weaknesses
This is a guest article written by Stuart Winter-Tear. The author’s views are entirely his own and may not reflect the views of IT Governance. Following on from my last post, in which I noted that a recent security survey revealed that 31% of all …
This is a guest article written by Stuart Winter-Tear. The author’s views are entirely his own and may not reflect the views of IT Governance. In light of a recent article here on the IT Governance blog entitled “What exactly is …
This is a guest article written by Stuart Winter-Tear. The author’s views are entirely his own and may not reflect the views of IT Governance. It all begins with a headline such as: “Hackers hack ” Obviously, you change “insert new …
This is a guest article written by Stuart Winter-Tear. The author’s views are entirely his own and may not reflect the views of IT Governance. Distributed denial-of-service (DDoS) attacks are on the rise and have been for some time. Report after …
This is a guest article written by Stuart Winter-Tear. The author’s views are entirely his own and may not reflect the views of IT Governance. People talk of the coming Internet of Things (IoT) but what is it and when is …