Bob Tarzey

Bob joined Quocirca in 2002. His main area of coverage is route to market for ITC vendors, but he also has an additional focus on IT security, network computing systems management and managed services. Bob writes regular analytical columns for Computing, Computer Weekly, TechRepublic and Computer Reseller News (CRN), and has written for The Times, Financial Times and The Daily Telegraph. Bob blogs for Computing, Info Security Advisor and He also provides general comment for the European IT and business press. Bob has extensive knowledge of the IT industry. Prior to joining Quocirca in he spent 16 years working for US technology vendors including DEC (now HP), Sybase, Gupta, Merant (now Serena), eGain and webMethods (now Software AG). Bob has a BSc in Geology from Manchester University and PhD in Geochemistry from Leicester University.
Find me on:

Recent Posts

WannaCry? Not really. A report from the 11th Eskenzi PR IT Analyst and CISO Forum

Posted by Bob Tarzey on Jun 12, 2017 11:59:23 AM

May 16th and 17th 2017 saw Eskenzi PR stage its 11th 2-day IT Security Analyst Forum, as usual, in London. The morning of the second day (which was a Wednesday) was the customary CISO (chief information security officer) roundtable. A coming together of 20 or so IT security leaders from blue chip UK enterprises and public sector organisations to share their views with the analysts and IT security vendors that sponsor the event.

Read More

Topics: security, General Data Protection Regulation

Winning the Domain Game

Posted by Bob Tarzey on Apr 20, 2017 9:11:50 AM

Over the last quarter century the Internet has become a fundamental utility that businesses, governments and consumers rely on; being off-line is less and less acceptable. And yet, a 2017 Quocirca research report, Winning the Domain Game (sponsored by Neustar), shows that 72% of UK business face internet down time regularly or occasionally; 61% suffer performance problems.

Read More

Topics: DNS

No silver bullet for business IoT security

Posted by Bob Tarzey on Jan 27, 2017 12:25:45 PM

The internet of things (IoT) has much potential to streamline business processes and provide new ways to interact with customers. But it also opens new frontiers for cyber criminals and hacktivists to exploit.

Quocirca published reports in 2015 (The many guises of the IoT)  and 2016 (European perceptions, preparedness and strategies for IoT security) that look at the interplay between IoT opportunities and threats. Some of the findings from these reports are highlighted in this buyer’s guide, which looks at how to secure the IoT in your organisation.

Read More

Topics: IoT, IoT Security

The Internet of Everything – the need to manage external things

Posted by Bob Tarzey on Dec 16, 2016 9:45:09 AM

Research commissioned by Quocirca in July 2016, as background to its Reference Architecture for the IoE (Internet of Everything), shows that most businesses in the UK and Germany believe the Internet of Things (IoT) is already having a major impact (43%) or expect that it will do so soon (44%). The remaining 13% are more sceptical, down from 18% in another survey, with a similar demographic, conducted by Quocirca in 2015 (The many guises of the IoT, sponsored by Neustar, a supplier of market intelligence,  web performance and internet security services).

Read More

Topics: IoT, IoE, Aggregator

The UK’s answer for Identity Governance and Admin

Posted by Bob Tarzey on Nov 22, 2016 11:42:13 AM

Quocirca is always pleased to see innovation from the UK IT sector and, over the years, IT security has produced many successful companies, often eventually acquired by US giants. Quocirca’s March 2016 Computer Weekly buyer’s guide on external identity management focussed mainly on US vendors, which dominate the identity and access management (IAM) market. However, there was one UK company covered in the report, ProofID which remains independent and continues to innovate.

Read More

Topics: Identity and Access Management

The shape of things to come – advanced networking security for the IoT

Posted by Bob Tarzey on Oct 24, 2016 10:39:40 AM

There is all sort of potential for IoT-related (Internet of Things) applications to streamline business processes and provide new ways of interacting with customers. This was recognised by a cross section of industry sectors surveyed in a new Quocirca report that covered the UK and German speaking region (European Perceptions, Preparedness and Strategies for IoT Security, Oct 2016). 68% said the IoT was already having an impact or would do soon.

Read More

Topics: IoT, security

IoT design, security and PKI

Posted by Bob Tarzey on Jun 30, 2016 1:39:47 PM

In a 2015 blog post – Securing the Internet of Things – time for another look at PKI? – Quocirca outlined why Public Key Infrastructure (PKI) is likely to see a new lease of life from the increasing deployment of applications that fit the general heading Internet of Things (IoT). As the first blog pointed out, IoT applications will only be a success if underlying security is ensured.

Read More

Topics: IoT, security, PKI

Why EU data protection will still apply to post-Brexit UK

Posted by Bob Tarzey on Jun 28, 2016 11:50:32 AM

The General Data Protection Regulation (GDPR) is expected to come in to force for EU member states in early 2018. It could be some time later that year that the UK finally severs its links with the EU. So for UK citizens will the GDPR be a short-lived regulation that can largely be ignored? The answer is no and the reasons fairly obvious; they are commercial, legal and moral.

Read More

Topics: EU, data protection, General Data Protection Regulation, Brexit

From SQL to NoSQL - and back again

Posted by Bob Tarzey on Jun 22, 2016 11:13:41 AM

We take a look at the suppliers behind the emergence of databases that organise web-scale datasets and the like -and the most recent set of upstarts dubbed NewSQL.

The first thing to say about NoSQL databases is that the name is misleading.

Another term used to describe this family of technologies is “not only SQL”, which may be cumbersome, but at least acknowledges that SQL (structured query language) – the main interface to traditional relational database management systems (RDBMS) – is still sometimes used to query NoSQL databases.

Read More


Come spy with me: drones and info-sec

Posted by Bob Tarzey on Jun 21, 2016 10:07:57 AM

UASs (unmanned aircraft system) or drones, as they are known in common rather than legal parlance, can easily cross physical barriers. As drone use increases, both for commercial applications and for recreational purposes, new challenges are emerging with regard to privacy and information security.

Millions of drones are estimated to have already been sold worldwide; tens of millions are expected to be out-there by 2020. As with any easily available new technology, criminals are early innovators, for example getting drugs across borders and mobile phones into prisons; here existing laws are being broken. However, drone operators who wish to remain within the law, need to be aware of evolving rules.

Read More

Topics: Drones, CAS, 4G data exchange, encryption

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all

Follow Me