Sapsiwai - Fotolia

David Laceys IT Security Blog

Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.

September 2010

  • Cyber security comes of age

    David Lacey 08 Sep 2010
  • It's rare to find sensible discussion of cyber security topics by authoritative bodies. I was highly impressed, therefore,to find a reasonably informed paper by the Council on Foreign Relations, a ...

  • Cloud computing contracts

    David Lacey 07 Sep 2010
  • I've long believed that Cloud computing will not be taken up by large corporate until much better legal and security assurances are provided. I'd even go as far as to say that we need a brand new ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close