David Laceys IT Security Blog

Recent Posts

  • Security awareness in different cultures

    David Lacey 18 Aug 2010
  • I've been off the air for several weeks, enjoying a seasonal break, and also working in the excellent Sultanate of Oman. (I have to admit that Muscat is one of my favourite locations, whether for ...

  • Security in an information age

    David Lacey 27 Jul 2010
  • This month's news has highlighted three developments that reflect the changing nature of the security landscape. The expulsion of Russian spies demonstrates the limitations of cold war tradecraft ...

  • Economic incentives for cyber security

    David Lacey 13 Jul 2010
  • I read that US Cyber Czar Howard Schmidt is scheduled to hold a meeting on Wednesday with Secretary of Commerce Gary Locke and Department of Homeland Security Secretary Janet Napolitano, where he ...

  • e-Crime Wales Summit 2010

    David Lacey 13 Jul 2010
  • If you're interested in tracking the proceedings at Thursday's e-Crime conference in Wales, there's a live blog with session highlights and a Twitter feed (use the hashtag #ecrimewales). You can ...

  • Wales shows the way in the fight against e-Crime

    David Lacey 12 Jul 2010
  • This Thursday, e-Crime Wales is holding its annual e-Crime Summit at the Celtic Manor Resort in Newport. It has become one of the major security events of the year, attracting excellent speakers ...

  • The Art of Cyberwar

    David Lacey 02 Jul 2010
  • The latest edition of the Economist has a major feature on Cyberwar, complete with a sensational image of an explosion in a civilian area, as well as a fascinating tale of a logic bomb. ...

  • Reading between the lines - small business security

    David Lacey 29 Jun 2010
  • "Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection... That's why the Symantec 2010 SMB Information Protection Survey is so ...

  • Personal data in the Cloud

    David Lacey 29 Jun 2010
  • No organisation should place any sensitive personal data in a cloud service without understanding the implications for regulatory compliance. It's easier said than done, however. The whole point of ...

  • Information Security in Africa

    David Lacey 23 Jun 2010
  • While our attention is focused on football in South Africa, it's worth taking note of other developments across the African continent, especially the growing threat presented by millions of ...

  • Securing emerging technologies

    David Lacey 21 Jun 2010
  • A reference in a Team Cymru news alert drew my attention to an interesting media article about the security of smart meters, a fast-moving development which justifies a lot more scrutiny, public ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close