David Laceys IT Security Blog

Recent Posts

  • We need to speed up security

    David Lacey 05 Sep 2014
  • I'm finally back blogging after a delightful summer break. Surprisingly, not a lot has changed in the cyber security world. Big security breaches have been surprisingly thin on the ground. And most ...

  • Meetings with remarkable security men

    David Lacey 27 Jun 2014
  • This week Doc Hugh Thompson of RSA fame was in London. We had an interesting and entertaining debate on current and future trends. Hugh is a consummate, multi-tasking professional: lecturer in ...

  • Ten answers to cyber security

    David Lacey 23 Jun 2014
  • My last posting was perhaps a bit too negative. I should correct that by setting out my own solutions to cyber security. Here are my ten answers. Invest more public money into imaginative new ...

  • Ten top experts and ten steps backwards

    David Lacey 22 Jun 2014
  • I was fascinated to see that the latest issue of Forbes magazine has a feature on cyber security. It sets out what must be fixed according to ten top experts. Have they got it right? The answer ...

  • Frameworks, Bloody Frameworks

    David Lacey 11 Jun 2014
  • Last night a friend sent me an email drawing attention to the UK Government's new cyber security scheme. This one is called "Cyber Essentials". So what's new? And what does it offer? The answer is ...

  • The future of mobile? Bright but cloudy

    David Lacey 05 Jun 2014
  • Tuesday evening saw the London launch of IDATE's 2014 version of their DigiWorld Yearbook, an excellent guide to telecoms, Internet and media markets. It was a useful opportunity to catch up with ...

  • No progress on the conference front

    David Lacey 16 May 2014
  • It's remarkable that in the face of the most sophisticated espionage threats, the most capable cyber-criminals, and the most severe compliance requirements ever experienced, the cyber security ...

  • Testing can be fun

    David Lacey 25 Apr 2014
  • It's interesting how many people are attracted to penetration testing, thinking it's more interesting and fun than conventional product testing, They're wrong. Scanning platforms for ...

  • The Electronic Pearl Harbour gets a step closer

    David Lacey 20 Apr 2014
  • As I expected we keep finding more and more security vulnerabilities in devices that shouldn't have them: essential control systems that govern the safety of critical infrastructure. The latest ...

  • Security: From Theoretical Business Enabler to Essential Overhead

    David Lacey 20 Apr 2014
  • Dropped through my door last week was the flyer advertising Infosecurity Europe 2014. The theme is "Security as a business enabler - are you fit for 2014?" It is an unfortunate choice of words, ...

  • Compliance is not security but has its place

    David Lacey 04 Apr 2014
  • Several weeks ago an Australian friend of mine sent me a delightful note pointing out how recent events and media reporting had confirmed some controversial points I had made last year in the ...

  • Research does not guarantee innovation

    David Lacey 21 Feb 2014
  • Earlier this week I attended the excellent Stevenson Science lecture at Royal Holloway University on "The Birth of Machine Cryptanalysis at Bletchley Park" given by Dr Joel Greenberg of the ...

  • Yet another contents list

    David Lacey 16 Feb 2014
  • For the past decade the real enemy of security practitioners has not been the hackers and malware that threaten our systems but the numerous best practices, compliance demands and audit actions ...

  • Let's get real about cyber security

    David Lacey 23 Jan 2014
  • This week I was speaking at FIC 2014, a leading French International Conference attended by 3,000 people, including Ministers, privacy experts and leading CSOs. It was refreshing, prompted by a ...

  • Farewell Sir Christopher Chataway

    David Lacey 19 Jan 2014
  • Sir Christopher Chataway who died today was a great athlete and a famous sports commentator. Not many security professionals will recognise the valuable contribution he made to cyber security as ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close