David Laceys IT Security Blog

November 2010

  • The Laws of Information Security

    David Lacey 23 Nov 2010
  • Andrew Yeomans reminded me of Peter Cochrane's Real Laws of Information Security. Inspired by these, I decided to create my own. The purpose of an information security programme is to cover the ...

  • Dual purpose technologies

    David Lacey 22 Nov 2010
  • The interesting thing from a security perspective about new technologies is that they solve as many problems as they create. Cloud computing and virtualization are great examples of that, providing ...

  • It's the instrumentation, stupid

    David Lacey 19 Nov 2010
  • I prefer to avoid clichés, but this snowclone heading seems to best capture the missing dimension in the current debate on cyber defence. Judging by the latest tome from Chatham House, we can ...

  • In search of innovation

    David Lacey 15 Nov 2010
  • A colleague of mine recently commented on the 'herd behaviour' that has become commonplace in the information security community. It's a dangerous trend, which stifles innovation. And it's often ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close