Risk assessment software deployment
It's the developers fault....is it?
Who Needs Firewalls?
Top campaigner for independent review of NHS's IT scheme receives New Year Honour
Another unstructured blog
A matter of life and death
ATM Security - and how not to improve it
Show me the evidence
Real Crime in the Virtual World
PCI makes for "Superior Security"
Rats in a sewer...
Around 1,000 staff leave CSC - a key supplier to the £12.4bn NHS scheme
Vista Content Protection – Can we have the facts please?
How important is this?
Security and Governance – One size doesn’t always fit all
Importance of security in the SDLC
Importance of documenting requirements
A Security Resolution for 2007 - Embed Security into your System Development Cycle
Security Forecasts for 2007
People, Process or Technology - Which hits the spot?
What motivates a web site attack
Security Achieves a New Level of Maturity
A pre-Christmas Saturday Soapbox
ID Cards and the Perils of Identity Management
Perceptions are the key to mitigating risk
It can happen anywhere
A Worrying Trend in Malware
VISA PCI Incentives
Confidential NHS paper on the health of the National Programme for IT
Truth, Lies and Perception
Why NHS IT matters
More on risk assessment
Real world risk assessment - don't forget to consider costs
The Strengths and Weaknesses of Data Mining
Safeguarding data - it's all in the process
HM Revenue and Customs, the Public Accounts Committee and accountability
Digital Rights Management – Must Try Harder
NPfIT Choose and Book Severity 1 incident
Lord Warner well-briefed on the NPfIT before retirement decision
Identity Management in a Virtual World
Choose and Book stalls after software upgrade
Lord Warner, minister in charge of the NHS's National Programme for IT "retires".
Neuro-Linguistic Programming – Snake Oil or Powerful Management Tool?
Regulatory Compliance - we need more detail
Managing Security Perception
More on outsourcing: software development
Joint investigation on NHS IT by Computer Weekly and Channel Four News
It's time to sort out our Information Management
Perception of outsourcing
Dirty tricks in the Name of Security
What's Your Risk Appetite?
Entering the Dark World of Cyber Crime
Return on Security Investment
Connecting for Health unilaterally changes wording of agreed statement
The Importance of Training
New software debate
Building a Secure World
Which Works Best? Point Solutions or Integrated Security?
Getting the documentation right
Databases are the New Target
Security companies need to maintain higher security standards
Web 2.0 Security
Terrorist Cyber Threats – how much should we be concerned?
Microsoft and Vista
Microsoft Vista - a welcome arrival
Campaign for clear talking
Securing the Written and Spoken Word
Crisis Management – a lesson from British Airways
Mysterious deaths, freedom of information, Marconi and the Ministry of Defence
Security Risk Assessment - Can it be automated?
Brave minister Lord Warner sees £12bn NPfIT NHS plan at first hand
How the Health Committee took decision to hold NHS NPfIT inquiry
Are briefings to ministers on the NPfIT optimistic?
Churchill's world speech on IT projects?
More on metrics
Process and Security
Visibility and Metrics - the keys to effective security
Managing Personal Identity Information
The Torchwood Option
Economics and Security
Inside the Jericho Forum
What doctors say about the NPfIT National Programme for IT
Financial impact of security incidents
Laptop security - it's not that difficult
Happy Thanksgiving (and more on vulnerability scanners)
Learning lessons - the advantages of mistakes
What the SANS Top 20 really tells us
Employee monitoring - has Big Brother arrived?
Who is David Lacey?
Welcome to my world
Security & Risk Blog