Sapsiwai - Fotolia

David Laceys IT Security Blog

Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.

July 2013

  • Farewell Barnaby Jack

    David Lacey 26 Jul 2013
  • I was deeply shocked and saddened to hear about the death of Barnaby Jack, one of the most brilliant and effective security researchers I have ever encountered. He researched vulnerabilities in ...

  • The art of strategic crisis management

    David Lacey 23 Jul 2013
  • Scientific American has an interesting article "How Would the U.S. Respond to a Nightmare Cyber Attack?" based on a recent crisis exercise. It's a good question as well as a well overdue exercise. ...

  • Security versus privacy - a difficult and uncomfortable balance

    David Lacey 18 Jul 2013
  • I've not bothered to comment so far on the numerous news reports on the NSA's PRISM programme. It's not because I have no views, but simply because it's revealed nothing surprising to the security ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close