
Nigel Stanley
Bloor Alumni
Research from Nigel Stanley
- Managing Cyber Business Risk on 28th April, 2014
- Infosec: Jailbroken devices are a threat to the network on 8th May, 2012
- SC Magazine Virtual Summit – Lock Down the Mobile Front on 4th May, 2012
- Keynote Panel at InfoSec 2012 – Smart Devices on 19th April, 2012
- Enterprise Readiness of Consumer Mobile Platforms on 17th April, 2012
- Google Android vs. Windows Phone 7.0 – A Comparative Analysis of Smartphone Security on 17th April, 2012
- Security at Mobile World Congress 2012 on 5th March, 2012
- RSA Cybercrime Trends Report 2012 on 13th February, 2012
- Nigel Stanley at Mobile World Congress Security Forum on 13th February, 2012
- Intellectual Property Theft: Protecting Data Against Cyber Criminals on 19th December, 2011
- Now hold your breath – the Olympic year is nearly upon us on 16th December, 2011
- BSIMM Version 3 – A Joy to Behold! on 3rd October, 2011
- The Technology Behind Cyberterrorism on 5th September, 2011
- Cyber Threats to National Security on 2nd August, 2011
- Nigel Stanley Presents at Jane’s Cyberwar Webinar on 20th June, 2011
- Voice Data Security on 27th May, 2011
- Secure Systems Development Conference – A Must See! on 27th April, 2011
- Mobile Phone Voice Protection with Morrigan Secure Application on 27th April, 2011
- BBC Interviews Nigel Stanley on Phone Hacking on 26th April, 2011
- BBC Story on Bloor Research into Jihadists use of Smartphones on 26th April, 2011
- Mobile Phone Hacking at Counter Terrorism Expo, London, April 2011 on 13th April, 2011
- What is the most secure smartphone? on 9th March, 2011
- Smartphone and mobile (cell) phone security on 22nd February, 2011
- McAfee and Wind River – Blown Together Nicely on 21st February, 2011
- The Smartphone: a real bug in your bed (3) on 18th February, 2011
- The Smartphone: a real bug in your bed (2) on 16th February, 2011
- The Smartphone: a real bug in your bed on 14th February, 2011
- Sound Trojan for Smartphones on 11th February, 2011
- Smartphone and Mobile Security – 2011 will be an Historical Year on 21st January, 2011
- Consumerisation is a challenge for IT managers. Is the smartphone to blame? on 13th January, 2011
- Are Smartphone users more dippy than most? on 10th January, 2011
- Making compliance real for those in the trenches on 20th December, 2010
- Cybercrime, Cyberwars, Cyberterrorism and Hacktivism – Part 3 on 17th December, 2010
- Cybercrime, Cyberwars, Cyberterrorism and Hacktivism – Part 2 on 15th December, 2010
- Cybercrime, Cyberwars, Cyberterrorism and Hacktivism on 14th December, 2010
- Cybercrime, Cyberwars, Cyberterrorism and Hacktivism on 14th December, 2010
- Cybercrime, Cyberwars, Cyberterrorism and Hacktivism – Part 1 on 13th December, 2010
- EU Compliance and Regulations on 26th November, 2010
- Sky News, Stuxnet and the End of the World on 26th November, 2010
- The Real Cost of a Data Breach – InfoSecurity Magazine US Virtual Conference Presentation on 5th November, 2010
- Third Annual Paradox Report – Security still an issue for mid-sized organisations on 27th October, 2010
- Is Symantec on track? Probably. Will it be successful? Maybe on 7th October, 2010
- Google Android apps found to be sharing data on 1st October, 2010
- The Ongoing Security Paradox on 30th September, 2010
- Application Code Security Testing in the Cloud on 10th September, 2010
- Application Code Security on 9th September, 2010
- No Software. No Source Code. No Problem. on 7th September, 2010
- Cell Phone Hacking Attacks – A Real and Present Danger (Part 4) on 25th August, 2010
- Cell Phone Hacking Attacks – A Real and Present Danger (Part 3) on 18th August, 2010
- The BBC puts Smartphone security on test on 10th August, 2010
- UAE, Saudi and the BlackBerry Security Conundrum on 9th August, 2010
- Cell Phone Hacking Attacks – A Real and Present Danger (Part 2) on 4th August, 2010
- Voice Data Security on 2nd August, 2010
- Interested in Cell (Mobile) Phone Hacking? on 30th July, 2010
- US Brands Targeted in Online Attacks on 29th July, 2010
- Cell Phone Hacking Attacks – A Real and Present Danger (Part 1) on 28th July, 2010
- Computer Crime Gets Sexy TV Show on 9th July, 2010
- Finally a Decent Use of Cloud Computing: Software Security on 11th June, 2010
- Finally a Decent Use of Cloud Computing: Software Security on 8th June, 2010
- Building Security In Maturity Model gets an Update on 12th May, 2010
- Time to hug a PGP employee? on 30th April, 2010
- Mobile Phone Hacking for on 21st April, 2010
- InfoSec 2010 – A “must visit” show on 20th April, 2010
- Email Leaks 10,000 Names from Police Data Check on 20th April, 2010
- Practical Steps to Ensure GCSX Code of Connection Compliance and Beyond on 28th March, 2010
- Database Activity Monitoring Part 5 – A Brief for Business Decision Makers on 17th March, 2010
- Battery Charger Beats Security on 15th March, 2010
- The Business Case for Database Activity Monitoring? on 15th March, 2010
- The Craziness of Passwords on 15th March, 2010
- Database Activity Monitoring Part 4 – Compliance and Technical Architecture on 10th March, 2010
- Database Activity Monitoring Part 3 – Other Common Attacks on 3rd March, 2010
- Database Activity Monitoring on 26th February, 2010
- Database Activity Monitoring Part 2 – SQL Injection Attacks on 24th February, 2010
- Database Activity Monitoring Part 1 – An Introduction on 16th February, 2010
- Conficker grounds police checks on 5th February, 2010
- The Security Paradox on 5th February, 2010
- EU Compliance and Regulations on 3rd February, 2010
- The strategic use of removable media on 27th January, 2010
- Common passwords 123456 and qwerty finally exposed on 22nd January, 2010
- Cracking a 768-bit RSA key on 19th January, 2010
- The Security Paradox on 18th January, 2010
- ICO Grows some Teeth on 18th January, 2010
- Encryption gets a Battering – Part 2, RSA on 18th January, 2010
- Mobile Phone Secret codes being hacked on 15th January, 2010
- DDOS without the D. Are we doomed then? on 15th January, 2010
- The Security Paradox on 14th January, 2010
- Encryption gets a Battering – Part 1, Mobile Phones on 14th January, 2010
- Removable media – the next encryption frontier? on 13th January, 2010
- The strategic use of removable media on 5th January, 2010
- Application Whitelisting – Worth a look? on 8th December, 2009
- Telling the Information Security Story on 25th November, 2009
- Joining the Dots Between Security and Compliance on 20th November, 2009
- Are IT audits like an MOT test for a car? on 17th November, 2009
- Interested in application (code) security? on 13th November, 2009
- Intrusion Prevention, Detection and Unified Threat Management on 4th November, 2009
- Database Key Management – an Introduction on 3rd November, 2009
- Is Database Encryption Worth it? on 14th October, 2009
- Symantec – is our future yellow? on 14th October, 2009
- Public Sector Data Breaches – Where do we go from here? on 29th September, 2009
- Generating Maximum Value from your IT Security Spend – An Analyst’s Perspective on 29th September, 2009