David Laceys IT Security Blog

Recent Posts

  • Calling the odds

    David Lacey 20 May 2016
  • I’ve had some interesting conversations recently with Professor Fred Piper regarding risk probability. The discussion started because I was concerned about assessments of risk probability, as one ...

  • Putting the SEC into DEVOPS

    David Lacey 24 Apr 2016
  • I've been pressing for greater speed in security management for many years. "Replace the Deming Loop with the Boyd (OODA) loop" has been my mantra. Yet when I first encountered DEVOPS, I ...

  • About the blog

    Michael Tidmarsh - Community Member 20 Apr 2016
  • Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.

  • Forecasts for 2016

    David Lacey 22 Dec 2015
  • Heavy demands for research and consultancy have restricted my blog postings this year. It's a reflection of the unrelenting growth in anything connected with cyber security. My New Year's ...

  • In praise of the Digital Catapult

    David Lacey 17 Jun 2015
  • I admit to being a long-standing critic of past UK government research initiatives. Having sponsored and managed several partly-funded research projects I've been disappointed with the decreasing ...

  • What's new in Cyber security?

    David Lacey 15 Jun 2015
  • I missed the opening of this year's Infosecurity Europe as I was speaking in Zurich. I did however catch the end, though there was little to fire my attention. The theme was dated, the slogans on ...

  • Minimising the snooping

    David Lacey 01 Mar 2015
  • It was interesting to see Tim Cook, CEO of Apple, voicing his opinions that government and companies should not have access to private consumer information. It's rich coming from a vendor with ...

  • Cyber security in Britain

    David Lacey 12 Feb 2015
  • I almost forgot to mention that last week's New Statesman carried a major feature on Cyber security in Britain, including articles from Francis Maude, Peter Sommer and myself. (Mine's the doom and ...

  • Showing our true character?

    David Lacey 08 Feb 2015
  • Last week GCHQ was censored over its sharing of internet surveillance data with the United States. There's no real surprise here. But what is interesting is to read it in the context of the New ...

  • If you can't beat them...

    David Lacey 03 Feb 2015
  • I keep reading defeatist talk. The latest is from a chap called James Lewis, a cybersecurity expert at the Washington DC based Center for Strategic and International Studies, who has been claiming ...

  • Predictions for 2015

    David Lacey 25 Jan 2015
  • The last two years have been an eye-opener for business, governments and citizens. They should now be aware of the vulnerability of information systems to penetration by spies, hackers and ...

  • Cyber terrorism is a step closer

    David Lacey 22 Dec 2014
  • Behind the escalating war of words between North Korea and the United States in the wake of the cyber attacks on Sony lies a dangerous, but inevitable trend: the beginnings of real cyber terrorism. ...

  • Predictions for 2014 - how did I do?

    David Lacey 18 Dec 2014
  • It's the time of year when we reflect on our progress (or failures) over the last year and anticipate the challenges of the coming year. Last year I made half a dozen predictions for 2014. How well ...

  • One day wonders

    David Lacey 23 Oct 2014
  • Last week Dr Hugh Thompson of Blue Coat and RSA fame was in London. I was fortunate to find a slot with him to meet up and exchange ideas. I like Hugh because he's not like the regular, dull ...

  • Security and the Internet of Things

    David Lacey 23 Oct 2014
  • Whether you like the term or not the so-called Internet of Things is generating a huge amount of interest, and a growing amount of security research, including great opportunities for ...