February 16, 2017 Leave a comment
I’ve moved my posts of upcoming commissions looking for PR or industry input over to my new site – please do also subscribe by email for updates. The form’s at the bottom of the page.
journalism | broadcasting | photography
August 1, 2016 Leave a comment
I’m moving my website to a new platform – please do visit over at stephenpritchard.com.
If you subscribed to updates (including updates on upcoming commissions) by email then you’ll continue to receive these by email.
But if you are a WordPress user, and subscribed that way, you’ll only see new posts in the WordPress reader. So, if you want to have email updates instead, please pop over to the new site and sign up there, on the home page or alongside any blogpost.
As ever, your email address will only be used for blog updates, nothing else!
July 5, 2016 Leave a comment
I’ve an opening for one or two independent speakers on the topic of security and virtualisation, for an Infosecurity Magazine webinar on Thursday, 21 July.
The format is a one-hour panel discussion, with each speaker talking for around 10 minutes with a short slide deck.
The outline is below – please get in touch if you’re interested in taking part. Unfortunately, those working for security vendors — and in this case, makers of virtualisation technology — aren’t eligible, sorry!
Title: Security in an Agile Datacentre
After breaches, data loss, major bugs and now the GDPR hit the headlines, senior members of the board are becoming more interested in cyber security, and are beginning to make budget and resources available.
Unfortunately, the task of securing systems is made that much harder, because the basics are not being done. Doors are being left open for attackers to take advantage of static and perimeter-centric security architecture to infiltrate the datacentre, and proliferate “laterally” to attack sensitive assets.
Blocking these attacks needs close co-operation between information security teams, IT, and data centre managers. Only by looking at all IT assets – including on the desktop, in the datacentre and in the cloud – can organisations bolster their defences, and ensure that a flexible and cost effective IT deployment is also secure.
In this webinar we will look at:
June 16, 2016 Leave a comment
I’m writing a couple of features for the Financial Times looking at imaging technology, and smart phone technology.
For the first, focusing on smart phones, we’re looking at some of the innovations that could be in the next generation of phones.
Taking imaging as a standpoint – films and TV ads are now being made on iPhones – what could the next wave of innovation look like? Is there a role for 8K cameraphones, HDR screens, or surround sound microphones?
We’ll look at how manufacturers are using these innovations to convince consumers to upgrade, and how some innovations might also leave users behind. Plus, what impact have these smartphones on the market for standalone cameras?
The article will be in the July Connected Business report so the deadline for submitting leads or background information is 1600 BST, Friday 17 June.
For a follow up piece to be published later, I’m also interested in research and commentary on innovations in broadcasting, film making and imaging. Last year saw 4K come of age. What’s next for this industry?
Please send any pitches by email in the first instance.
May 19, 2016 Leave a comment
I’m moderating two webinars for Infosecurity Magazine in June.
The topics and timings are below, and I have two guest spaces on each session.
As ever our preference for speakers is:
Unfortunately we can’t take speakers from vendors whose main or sole business is IT security.
The deadline to submit speaker suggestions is 1700 BST, Tuesday 24 May.
16 JUN 2016, 15:00 BST, 10:00 EDT
Logging in with a username and password is going to be a very different experience in the future, particularly for the enterprise, consumers, e-commerce and more. Compromised identities, including passwords, are now the number one way cybercriminals are accessing and breaching organisations, over the use of malware.
In this webinar, learn from industry experts and look at the future of identity and the importance of secure credentials including:
30 JUN 2016, 15:00 BST, 10:00 EDT
There’s no such thing as infallible security, and preventing every single security breach is impossible.
But when a breach does happen, the steps an organization takes next will largely determine the damage they suffer, and how the business recovers. A security team’s first reaction is often to move to eject the attackers. But is that always the right strategy? Especially when it comes to advanced threats, there is a case for biding your time, and gathering intelligence.
In this webinar, we will look at the key considerations for deciding how and when to expel attackers from the network, including: