David Laceys IT Security Blog

September 2008

  • Security and SaaS: a compelling combination

    David Lacey 30 Sep 2008
  • It's been my second day at the Gartner IT Security Summit. Many of my CISO colleagues were clearly flagging by lunchtime. Several went home early as there was little of interest for them, generally ...

  • Sex, death and Gartner IT security summits

    David Lacey 29 Sep 2008
  • Today was the opening of the Gartner IT Security Summit 2008 in London. It's becoming a major event, attending by hundreds of people. And it was certainly an interesting curtain raiser: a mixture ...

  • The next generation Internet

    David Lacey 27 Sep 2008
  • I was eager to read the latest blog posting by Vint Cerf, Google's Chief Internet Evangelist, on the next generation Internet. What does he have to say? Vince says that most of us will have access ...

  • Relationships are the key to secure outsourcing

    David Lacey 25 Sep 2008
  • For several months I've been researching the subject of security in outsourcing and off-shoring. I've read lots of books and papers, and interviewed experts from many related fields: procurement ...

  • We know where you're looking

    David Lacey 24 Sep 2008
  • I was interested to see that Google's new Android phone has a built in compass, introducing yet another dimension to your cyberspace footprint. Added to GPS, cellular triangulation and built-in ...

  • Getting to grips with the human factor

    David Lacey 23 Sep 2008
  • Yesterday I was in the Netherlands speaking at Endeavour Events' excellent InfoPROTECT 2008 conference. This event attracts a very good crowd and it seems to get the balance right between lectures, ...

  • The new media landscape

    David Lacey 20 Sep 2008
  • I've just got back from several days in Madeira, attending and speaking at an exclusive Pitney Bowes conference on "The New Media Landscape". I'd advise all security practitioners to aim to attend ...

  • Laptop and PDA losses still a major problem

    David Lacey 19 Sep 2008
  • A new survey of London taxi drivers, carried out by Credant Technologies, indicates that 55,843 mobile phones and 6,193 other devices, such as laptops, have been left in the back of black cabs over ...

  • Spy versus spy

    David Lacey 17 Sep 2008
  • The UK Government ruling on the legality of Phorm is just the beginning of a long series of wars to exploit personal information for good or bad purposes. As I've been saying since the turn of the ...

  • Spin, FUD and disinformation

    David Lacey 15 Sep 2008
  • I have long held the opinion that the next big security wave will be focused on information integrity. Both the problem space and the solution space are highly immature. They operate at many ...

  • Data loss detection and prevention

    David Lacey 12 Sep 2008
  • Yesterday I was speaking at a Butler Group masterclass on Information Risk and Data Loss Prevention. The discussions with delegates confirmed for me how seriously organisations now take this issue, ...

  • The Future is a long time coming

    David Lacey 10 Sep 2008
  • My briefcase has been weighed down lately with large paper documents, things such as the manuscript for my new book (one and a half inches thick printed double sided on A4 paper) as well as ...

  • Reading between the lines

    David Lacey 08 Sep 2008
  • The BBC News Website carries an interesting article on text message analysis. This technique is becoming a new, powerful tool for solving crime cases. It's already been used to help secure a murder ...

  • Coming to terms with the Insider Threat

    David Lacey 04 Sep 2008
  • Yesterday I attended a FASTtalk CEO round table on the "The Threat from Within". It's interesting how important this subject has become following the spate of high profile data breaches over the ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close