
Sapsiwai - Fotolia
David Laceys IT Security Blog
Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.
May 2007
-
Service Providers Should Immediately Inform Users About Incidents Affecting Their Services
31 May 2007 -
IT and Physical Security Management - Should they be Integrated?
29 May 2007 -
Security and the Great Game of Fly-Fishing
28 May 2007
Yesterday Tiscali, a leading UK ISP, admitted that they were "experiencing issues with outbound emails" having been targeted by spammers which resulted in other ISPs blocking emails sent via their ...
An Australian friend of mine sent me this reference to a recent story of a sophisticated physical attack on point-of-sale terminals handling financial transactions. It's not the first nor is it the ...
The blog postings have been a bit thin over the last week as I've been fly-fishing for wild brown trout in North West Sutherland. (Not Sunderland, I should add, as a journalist once misquoted.) ...
-
We Give Our Enemies Too Much Credit
25 May 2007 -
Time to Consider Quantum-Immune Cryptographic Solutions
22 May 2007 -
Don't miss out on the Cyber Security KTN Conference
20 May 2007 -
Honesty and Openness are the Foundations of Real Security
19 May 2007 -
How Business Continuity is Changing
15 May 2007 -
Federated Identity Management - The Real Issues
14 May 2007 -
Big Brother Google
12 May 2007
Thinking back on last week's NISC8 Conference, I have to admit to an uncomfortable feeling that we've been giving far too much credit to criminals, terrorists and spies. It's bad enough using ...
Recent breakthroughs in the development of Quantum Computing are forcing IT Security Managers to rethink their cryptographic standards. In February D-Wave Systems, a spin-off from the University of ...
I'm a very keen supporter of research and innovation. Without it, I believe we will face serious problems in the future, as many of our traditional physical and procedural controls will be largely ...
I never know whether to believe IT vendors when they tell me that they're serious about security. After all, as Mandy Rice-Davies famously put it: "Well they would say that wouldn't they". So I was ...
This week I'm speaking at Sapphire's excellent NISC8 Conference in St. Andrews on "The Art of Business Continuity Management". It's a subject close to my heart as I've been an active practitioner ...
Recently I've been advising a colleague in a large organization about the options for implementing applications requiring extensive access by multiple third parties, many of which are direct ...
It was reassuring to read that Google have started to examine web pages for malicious content. But scarier to note that, having surveyed billions of sites and subjected 4.5 million pages to ...
-
More Paranoia - this time from Microsoft
12 May 2007 -
Information Age Paranoia
10 May 2007 -
The Future of Security
08 May 2007 -
Whither De-perimeterisation?
05 May 2007 -
Securing Portable Devices Isn't Easy
03 May 2007
I was fascinated to hear that Microsoft banned journalists from Steve Ballmer's keynote at their Business Intelligence Conference yesterday. Of course that did not stop them from standing outside ...
Further signs of paranoia about Information Age risks emerged over the last week. The first was a ban imposed by the Province of Ontario on access by officials to the social networking site ...
Tonight I'm speaking on the Future of Security for the BCS South West Branch at the University of Plymouth. It may seem a little off the beaten track. But I've been very impressed by what I've seen ...
Just published on the Jericho Forum site are the presentations from last week's conference in London. They include the results of an interesting survey of attendees (carried out with the help of ...
Earlier this week I gave a talk to Intellect's excellent Security and Privacy Group on the subject of how to manage the risks associated with portable devices. It's a hot topic because the risks ...