David Laceys IT Security Blog

Recent Posts

  • Security awareness in different cultures

    David Lacey 18 Aug 2010
  • I've been off the air for several weeks, enjoying a seasonal break, and also working in the excellent Sultanate of Oman. (I have to admit that Muscat is one of my favourite locations, whether for ...

  • Security in an information age

    David Lacey 27 Jul 2010
  • This month's news has highlighted three developments that reflect the changing nature of the security landscape. The expulsion of Russian spies demonstrates the limitations of cold war tradecraft ...

  • Economic incentives for cyber security

    David Lacey 13 Jul 2010
  • I read that US Cyber Czar Howard Schmidt is scheduled to hold a meeting on Wednesday with Secretary of Commerce Gary Locke and Department of Homeland Security Secretary Janet Napolitano, where he ...

  • e-Crime Wales Summit 2010

    David Lacey 13 Jul 2010
  • If you're interested in tracking the proceedings at Thursday's e-Crime conference in Wales, there's a live blog with session highlights and a Twitter feed (use the hashtag #ecrimewales). You can ...

  • Wales shows the way in the fight against e-Crime

    David Lacey 12 Jul 2010
  • This Thursday, e-Crime Wales is holding its annual e-Crime Summit at the Celtic Manor Resort in Newport. It has become one of the major security events of the year, attracting excellent speakers ...

  • The Art of Cyberwar

    David Lacey 02 Jul 2010
  • The latest edition of the Economist has a major feature on Cyberwar, complete with a sensational image of an explosion in a civilian area, as well as a fascinating tale of a logic bomb. ...

  • Reading between the lines - small business security

    David Lacey 29 Jun 2010
  • "Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection... That's why the Symantec 2010 SMB Information Protection Survey is so ...

  • Personal data in the Cloud

    David Lacey 29 Jun 2010
  • No organisation should place any sensitive personal data in a cloud service without understanding the implications for regulatory compliance. It's easier said than done, however. The whole point of ...

  • Information Security in Africa

    David Lacey 23 Jun 2010
  • While our attention is focused on football in South Africa, it's worth taking note of other developments across the African continent, especially the growing threat presented by millions of ...

  • Securing emerging technologies

    David Lacey 21 Jun 2010
  • A reference in a Team Cymru news alert drew my attention to an interesting media article about the security of smart meters, a fast-moving development which justifies a lot more scrutiny, public ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close