![Cover for Managing Cyber Business Risk - with Content Assurance and Cyber Insurance](https://www.bloorresearch.com/wp-content/uploads/2014/04/cover-managing-cyber-business-risk-12010.jpg)
Managing Cyber Business Risk - with Content Assurance and Cyber Insurance
Published: 28th April 2014 | By: Nigel Stanley
Over the past few years risks associated with technology and the internet have created a whole new sub-genre called cyber business risk. Whilst there are...
![Cover for Big data and the mainframe](https://www.bloorresearch.com/wp-content/uploads/2014/03/cover-big-data-and-the-mainframe-11992.jpg)
Big data and the mainframe
Published: 24th March 2014 | By: Philip Howard
We discuss some of the issues surrounding big data deployments and how they might be resolved within the context of a mainframe environment.
![Cover for Managing indicators of compromise - taking a more proactive stance on security breach remediation](https://www.bloorresearch.com/wp-content/uploads/2013/10/cover-managing-indicators-of-compromise-11876.jpg)
Managing indicators of compromise - taking a more proactive stance on security breach remediation
Published: 11th October 2013 | By: Fran Howarth
This document introduces the concept of IOCs and explains how organisations can use them for their benefit.
![Cover for Tools for Data Migration](https://www.bloorresearch.com/wp-content/uploads/edd/2018/07/tools-for-data-migration-092013.jpg)
Tools for Data Migration
Published: 12th September 2013 | By: Philip Howard
This paper discusses the various types of tools that may or should be used to support successful data migrations.
![Cover for The importance of performance to DevOps](https://www.bloorresearch.com/wp-content/uploads/edd/2018/07/the-importance-of-performance-to-devops-072013.jpg)
The importance of performance to DevOps
Published: 18th July 2013 | By: Philip Howard
Production performance is not normally a functional requirement for application development projects but, in our minds, it should be.
![Cover for Identity management services - bringing external services into the mix](https://www.bloorresearch.com/wp-content/uploads/2013/03/cover-identity-management-services-11794.jpg)
Identity management services - bringing external services into the mix
Published: 26th March 2013 | By: Fran Howarth
In the past four to five years, identity and access management technologies and services have seen considerable evolution and innovation.
![Cover for Data Masking](https://www.bloorresearch.com/wp-content/uploads/2012/10/cover-data-masking-11726.jpg)
Data Masking
Published: 3rd October 2012 | By: Philip Howard
In this paper we shall discuss why it is important, why you should consider using a tool, and what features you should look for.
![Cover for People-Centric Security - adapt to the real-world needs of
workers, partners and customers](https://www.bloorresearch.com/wp-content/uploads/edd/2018/07/people-centric-security-052012.jpg)
People-Centric Security - adapt to the real-world needs of
workers, partners and customers
Published: 2nd May 2012 | By: Fran Howarth
Taking a people-centric view of security allows controls to be placed around an individual's data.
![Cover for Where is the Business? - Business intelligence empowered by location](https://www.bloorresearch.com/wp-content/uploads/edd/2018/07/where-is-the-business-022012.jpg)
Where is the Business? - Business intelligence empowered by location
Published: 23rd February 2012 | By: Natalie Newman
Business intelligence supports decision-making but location shows you 'Where is the Business?'