
Sapsiwai - Fotolia
David Laceys IT Security Blog
Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.
October 2007
-
A Picture Paints a Thousand Words
31 Oct 2007 -
How to win Friends and Influence People
30 Oct 2007 -
To Catch a Thief
29 Oct 2007
I've always stressed the importance of strong visual images in security programmes and awareness campaigns. It's surprising how much leverage a strong, well-thought-through image can generate. ...
They say that a week is a long time in politics. But changing public sector strategy can take a lifetime. So it’s unrealistic to expect civil servants to turn on a sixpence and immediately revise ...
Cyberspace has an unusual effect on our perception of acceptable behaviour. For example there’s a phenomenon researchers term “the disinhibition effect” that encourages Internet users to behave in ...
-
Crisis Management and the Number Two Rule of Holes
26 Oct 2007 -
Trusted Computing Hits the Road
25 Oct 2007 -
The Limitations of Business Continuity Planning
22 Oct 2007 -
Counting the Threats from Intelligence Services
21 Oct 2007 -
Collaboration is the Key to Tackling Cybercrime
19 Oct 2007 -
Compliance Demands Are Getting Too Prescriptive
17 Oct 2007 -
One Step Back for the Compliance Bandwagon
16 Oct 2007
The art of crisis management is to think forwards and aim to stay ahead of the media, anticipating negative coverage and taking steps to mitigate reputation damage. That’s why it pays to be honest ...
The cold, windy Docklands setting was an appropriate backdrop for the RSA Conference in London this week. There was little new, hot or entertaining on show. But, like Infosecurity, it’s a useful ...
A new survey by Symantec suggests that more than nine out of ten UK organisations carry out full evaluations of their disaster recovery plans but almost half of the tests fail. Should we be ...
CNN’s web site has an interesting item on the nature of the foreign intelligence hacking threat to US interests. It reports Joel Brenner, National Counterintelligence Executive, as saying that it’s ...
Yesterday I attended a Parliament and the Internet Conference at the House of Commons. It’s a great forum which brings together many leading UK stakeholders from Government, Parliament, Academia ...
Benjamin Wright's comments on the ill-fated California AB 7799 Bill raise an important criticism about emerging compliance demands: they're getting too prescriptive. This was a trend I pointed out ...
Last weekend California Governor Arnold Schwarzenegger vetoed legislation to make merchants financially liable for costs due to retail data breaches. No doubt this was a huge relief to banks and ...
-
Exploit Wednesday Strikes Again
13 Oct 2007 -
The Rich Untapped Seam in Digital Communications
10 Oct 2007 -
Preparing for the Coming Storm
06 Oct 2007 -
Patient Records – The Debate is Just Starting
04 Oct 2007 -
A Sharp Increase in Email Threats
01 Oct 2007
A few days ago Symantec reported a Word exploit in the wild just one day after Microsoft released the patch for the corresponding vulnerability. Rather unusually it was created using Word for ...
The blog postings have been a bit thin these past few days as I’ve been head-down, writing up a lengthy feasibility study report on the potential for analysing security behavior in digital ...
It’s comforting to read those security threat level indicators that inform us that the threat from malware attacks is currently low. Unfortunately there are blind spots in early warning systems. ...
Earlier this week I attended a British Computer Society event “Public health - private data?” hosted jointly by the BCS Health Informatics Forum and the BCS Security Forum. This is not a new issue. ...
Message Labs latest intelligence report shows a sharp increase in viruses, spam and email threats, which now stand at record levels. Over one in fifty emails now contains malware, generally through ...