Latest posts

Opinion

13 March 2017 | By Paul Dewar

Don't let security worries hold you back from the public cloud

The public cloud is coming of age. Is it time to question your assumptions about this maturing technology?

Opinion

15 November 2016 | By Jonathan Jenkyn

A user's guide to cryptography - part four

KCOM's security guru Jonathan Jenkyn tackles cryptography in a six part blog series.

Opinion

10 November 2016 | By Kouros Roshanzamir

APIs and trustful habits - part one

Kouros Roshanzamir continues his blog series on Digital Transformation. This week: embedding trust into your API strategy.

Opinion

10 November 2016 | By Jonathan Jenkyn

A user's guide to cryptography - part three

KCOM's security guru Jonathan Jenkyn tackles cryptography in a six part blog series.

Opinion

1 November 2016 | By Jonathan Jenkyn

A user's guide to cryptography - part two

KCOM's security guru Jonathan Jenkyn tackles cryptography in a six part blog series.

Opinion

27 October 2016 | By Jonathan Jenkyn

A user's guide to cryptography - part one

KCOM's security guru Jonathan Jenkyn tackles cryptography in a six part blog series.

Events

22 August 2016 | By

CloudSec London 2016

On Tuesday September 6th, KCOM will be sponsoring CloudSec London 2016, a must-attend event in any cloud professional's calendar.

Opinion

4 May 2016 | By Paul Dewar

Why 8 out of 10 UK businesses prefer cloud-based services

With widespread adoption of cloud-based services across UK businesses, are there any reasons to hold back?

Opinion

27 April 2016 | By Paul Dewar

Balancing IT innovation with business continuity delivery and operations

CIOs are under pressure to deliver change and facilitate innovation, but how do they balance this with the need for business continuity and …

Opinion

21 December 2015 | By Jonathan Jenkyn

OWASP : Unvalidated Redirects and Forwards

Security specialist Jonathan Jenkyn concludes his series of posts focused on OWASP; this post covers Unvalidated Redirects and Fowards.

Opinion

17 December 2015 | By Jonathan Jenkyn

OWASP : Using Components with Known Vulnerabilities

Security specialist Jonathan Jenkyn continues his posts with a focus on OWASP; this post covers Using Components with Known Vulnerabilities.…

© KCOM Group PLC 2017