David Laceys IT Security Blog

July 2010

  • Security in an information age

    David Lacey 27 Jul 2010
  • This month's news has highlighted three developments that reflect the changing nature of the security landscape. The expulsion of Russian spies demonstrates the limitations of cold war tradecraft ...

  • Economic incentives for cyber security

    David Lacey 13 Jul 2010
  • I read that US Cyber Czar Howard Schmidt is scheduled to hold a meeting on Wednesday with Secretary of Commerce Gary Locke and Department of Homeland Security Secretary Janet Napolitano, where he ...

  • e-Crime Wales Summit 2010

    David Lacey 13 Jul 2010
  • If you're interested in tracking the proceedings at Thursday's e-Crime conference in Wales, there's a live blog with session highlights and a Twitter feed (use the hashtag #ecrimewales). You can ...

  • Wales shows the way in the fight against e-Crime

    David Lacey 12 Jul 2010
  • This Thursday, e-Crime Wales is holding its annual e-Crime Summit at the Celtic Manor Resort in Newport. It has become one of the major security events of the year, attracting excellent speakers ...

  • The Art of Cyberwar

    David Lacey 02 Jul 2010
  • The latest edition of the Economist has a major feature on Cyberwar, complete with a sensational image of an explosion in a civilian area, as well as a fascinating tale of a logic bomb. ...




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...