Sapsiwai - Fotolia

David Laceys IT Security Blog

Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.

December 2011

  • Six security forecasts for 2012

    David Lacey 29 Dec 2011
  • My crystal ball tells me that 2012 is a relatively predictable one. That's largely because we've experienced significant changes in the political, business and security landscapes, ones that are ...

  • Security Forecasts for 2011 - Right or Wrong?

    David Lacey 26 Dec 2011
  • As we near the close of 2011, I find it instructive to look back and see just how accurate my forecasts proved to be. At the start of the year I forecast three major shifts in thinking during 2011. ...

  • No fix in sight for SCADA security

    David Lacey 16 Dec 2011
  • Well done for Shell for drawing public attention to the serious hazards presented by cyber attacks on physical machinery. Unfortunately it's much too late. Today's critical infrastructure is ...

  • Small businesses need better security advice

    David Lacey 13 Dec 2011
  • I was concerned to read a recent report of a study by SecurityMetrics, a vendor of merchant data security solutions, which claims that 71% percent of the merchants who took part were found to store ...

  • Following the rules of the game

    David Lacey 11 Dec 2011
  • Michael Colao's excellent presentation to the ISSA-UK Chapter last week on the legal implications of social networking got me thinking. Not so much about the letter of the law, but more about the ...

  • Communicating information quickly and efficiently

    David Lacey 10 Dec 2011
  • Information security practitioners have long been poor at developing awareness materials. Partly this is because misguided governance systems focus on legalistic policies and procedures that no one ...

  • Another elephant in the Cloud

    David Lacey 07 Dec 2011
  • Experienced professionals don't need Machiavelli to point out that introducing change is difficult, not just from a technical perspective but also from a political or legal one. Outsourcing and ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close