
Sapsiwai - Fotolia
David Laceys IT Security Blog
Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.
July 2007
-
What’s in a Name?
31 Jul 2007 -
No Disaster is Too Large to Plan For
30 Jul 2007 -
Are We Prepared for a London Flood?
28 Jul 2007
“'Tis but thy name that is my enemy” wrote Shakespeare. And the same might be said for many professionals operating in the Information Security field. Job titles are proliferating to the extent ...
With Business Continuity at the forefront of my mind, I was interested to read that Bruce Schneier's recent comments on pandemic planning had attracted some criticism from journalists and analysts. ...
With many parts of the UK still under water and further bad weather forecast, it’s remarkable timing that a new disaster film, due out shortly, is based on London being flooded by a storm surge. ...
-
Another Breach of Credit Card Data
27 Jul 2007 -
A Good Time to Review Business Continuity Plans
25 Jul 2007 -
More Personal Data at Risk
23 Jul 2007 -
Security Classifications – more than just a label
20 Jul 2007 -
Top 10 Security Developments of the Last Decade
17 Jul 2007 -
The Implications of Merging Business and Personal Lifestyles
16 Jul 2007 -
Crisis Room Design – Fantasy and Reality
14 Jul 2007
It’s good that organisations are now coming clean about breaches of customer credit card data, though it’s worrying that there are so many of these incidents. Yesterday Newcastle City Council ...
You can’t open a UK newspaper or switch on the TV news without getting extensive coverage of the devastating floods. That makes it a very good time to review Business Continuity Plans. There’s ...
Just when I thought that most organisations would have learned the lessons from the recent spate of high profile data breaches, we hear that SAIC has admitted placing at risk the personal data of ...
A colleague in a large organisation recently asked me for advice on the design of their security classification system. On the surface this might seem a simple task, but I can assure you that ...
The staff of the Software and Information Industry Association (SIAA), a trade association for the software and digital information industry, recently published a Top 10 of the most significant ...
I’ve written before on the challenges presented by the progressive erosion of the traditional boundary between business and personal lifestyles. It's all a consequence of the growth of digital ...
I enjoyed watching the latest Die Hard movie. It’s excellent entertainment. And it's all about cyber terrorism. So it’s a must for anyone working in the Critical National Infrastructure field. Of ...
-
De-perimeterisation – What does it really mean?
12 Jul 2007 -
Data Breach Disclosure Will Focus Minds and Business Cases
10 Jul 2007 -
Identity Management – Who Decides?
09 Jul 2007 -
Security in Identity Management – There’s a long way to go
08 Jul 2007 -
Who Will Control the Market in Zero-Day Vulnerabilities?
07 Jul 2007
People often ask me what De-perimeterisation really means for organisations. Is there, for example, a recommended architecture, methodology or action plan? That’s not easy to answer. I can ...
I was interested to read the results of a Secerno poll reported in today’s Computer Weekly. The poll reveals that 77% of IT Security professionals back a UK data breach disclosure law, and that ...
Today’s DTI Conference on “Ensuring privacy and consent in identity management infrastructures” was a significant step forward for identity management and privacy in the UK. Amongst other things, ...
Security in Identity Management is this week’s hot topic in London, with a Conference at DTI tomorrow on the subject of “Ensuring privacy and consent in identity management infrastructures”, ...
Every security professional should be keeping an eye on the developing market in security vulnerabilities. For some time, security vendors such as i-Defense and TippingPoint have been offering ...