David Laceys IT Security Blog

July 2009

  • Safeguarding the DNA of the Internet

    David Lacey 29 Jul 2009
  • A few postings ago I mentioned the growing importance of random acts of kindness by unsung heroes in rescuing or maintaining vital Internet services. Make no mistake; this is the future of ...

  • Both sides now

    David Lacey 27 Jul 2009
  • As Joni Mitchell might have put it, you can look at cloud computing from two sides now. On the one hand they can introduce a worrying uncertainty as to where your data is stored and who might have ...

  • Security and banks

    David Lacey 27 Jul 2009
  • According to recent research by Gartner, consumers regard security as the most important feature in online banking. That's a pretty obvious finding. Security is the cornerstone of banking. ...

  • Improving security in the clouds

    David Lacey 24 Jul 2009
  • A posting on Bruce Schneier's blog drew my attention to this interesting case study of how a hacker was able to gain access to the personal accounts of Twitter executives. There's nothing new here ...

  • Exploiting the power of networks

    David Lacey 23 Jul 2009
  • For several years I've been preaching that the key to effective security management is to harness the power of social networks to help identify risks and prevent or respond to incidents. My book ...

  • How many lost laptops can you justify?

    David Lacey 20 Jul 2009
  • I was interested to read the figures published last week about the number of laptops that went missing last year from government departments. I've been tracking this problem for the past decade and ...

  • Getting the basics right

    David Lacey 20 Jul 2009
  • This week's Economist includes an interesting feature on the failure of economics. It addresses three main critiques: that macro and financial economists helped cause the credit crisis, that they ...

  • Doing nothing is not an option

    David Lacey 18 Jul 2009
  • Erudine have just published the latest edition of Engine, their excellent technology magazine. The theme of this edition is 'Legacy Evolution' and it contains some excellent articles from CIOs, ...

  • Information security at the crossroads

    David Lacey 17 Jul 2009
  • Infosecurity have added a few more experts to their list of guest bloggers, including Howard Schmidt and myself. I've just posted a short article on the current status of information security ...

  • How to be a Superbrand

    David Lacey 15 Jul 2009
  • I was interested to read that Microsoft has overtaken Google to top the latest UK consumer survey of leading brands. The three criteria used were quality, reliability and distinction. These are not ...

  • Security in the clouds

    David Lacey 13 Jul 2009
  • We've seen a fair bit of media coverage over the last week about the launch of Google's new Chrome operating system, and how this will herald a new era of cloud computing. One thing that's ...

  • Secrets for sale

    David Lacey 09 Jul 2009
  • The claim in today's Guardian newspaper about journalists employing private detectives to use illegal means of gathering information on celebrities comes as no surprise. This has been going on for ...

  • Environments influence behaviour

    David Lacey 05 Jul 2009
  • Some interesting experiments in Holland have confirmed that many people adjust their behaviour according to the people and environment around them. In this research it was a case of graffiti ...

  • The perils of security software

    David Lacey 05 Jul 2009
  • Some security software needs to be labeled with a hazard warning, because it can do immense damage when it goes wrong. Security software glitches can trash client machines, close down access to ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close