Sapsiwai - Fotolia

David Laceys IT Security Blog

Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.

March 2008

  • The Future of Correspondence

    David Lacey 31 Mar 2008
  • It’s sad to think that future historical records might be no more than a print-out of an electronic image. The forthcoming auction this week of Presidential manuscripts at Sotheby's in New York, ...

  • Cyber Warfare

    David Lacey 31 Mar 2008
  • It might sound like science fiction, but Cyber Warfare is real, growing and important. Today saw the kick-off of a two-day conference in London on this subject organised by Defence IQPC. It’s a ...

  • Raising the Issues of Biometrics

    David Lacey 30 Mar 2008
  • It’s reported in The Register that the latest edition of the Chaos Computer Club’s magazine contains a copy of the fingerprint of Wolfgang Schauble, the German Interior Minister. The image is ...

  • The New Cyber Security Czar

    David Lacey 28 Mar 2008
  • The US has appointed Rod A. Beckstrom, a technology entrepeneur and author to head up the new National Cyber Security Center. He's an interesting and imaginative choice. Rod has a successful track ...

  • A Step Back for Biometrics

    David Lacey 24 Mar 2008
  • The debate over BAA’s proposal to fingerprint passengers at Heathrow’s new fifth terminal is a sign of the times. It’s part of the growing dilemma of how to optimise the balance between security, ...

  • Responding to e-Crime

    David Lacey 21 Mar 2008
  • Computer Weekly reports that the Home Office turned down a request by ACPO to find £1.3 million cash to fund a pilot e-Crime unit. At first glance this might seem a setback. But, in my view it’s ...

  • Collaboration Oriented Architecture Hits the Road

    David Lacey 20 Mar 2008
  • The Jericho Forum will be unveiling details of its new Collaboration Oriented Architecture (COA) at the RSA show in San Francisco in April followed by Infosecurity in London. COA provides guidance ...

  • Network IPS is Dead - Long Live Application IPS

    David Lacey 18 Mar 2008
  • Back in 2003 Gartner announced that Intrusion Detection Systems were a costly failure and would be obsolete by 2005. They saw problems with false positives, false negatives, bandwidth limitations ...

  • Regaining Public Trust in e-Government Services

    David Lacey 15 Mar 2008
  • The British Computer Society have just published details of an interesting survey of UK citizen's views on e-Government services. You can guess the outcome. Not surprisingly there is high concern ...

  • Turning Threats into Opportunities

    David Lacey 14 Mar 2008
  • Most IT security professionals are aware of the damaging influence a major incident can have on brand value and company reputation. But it doesn't have to be that way. At this week's MISTI CISO ...

  • The Softer Side of Security

    David Lacey 13 Mar 2008
  • For the last few days as I've been over in Orlando speaking at MIS Training Institute's excellent Infosec World. It's one of the most comprehensive conferences in terms of subject area coverage, ...

  • Confidential Briefings and the Chatham House Rule

    David Lacey 10 Mar 2008
  • I’ve always been a great admirer of the Royal Institute of International Affairs (RIIA) otherwise known as Chatham House. And I’ve always trusted colleagues to respect any confidential briefings ...

  • Identity Cards Get Personal

    David Lacey 08 Mar 2008
  • HM Treasury has just published Sir James Crosby’s report on Challenges and opportunities in identity assurance. It’s a document that all security professionals should read, not only because it's a ...

  • Sourcing and Security

    David Lacey 04 Mar 2008
  • The recent seizure of $76 million worth of counterfeit Cisco kit by US authorities comes as no surprise. What’s interesting is that security is cited as a major concern. Security professionals in ...

  • Professionalism

    David Lacey 04 Mar 2008
  • I’m pleased that my fellow blogger, Stuart King, takes pride in his new qualification as one of the first full members of the Institute of Information Security Professionals (IISP). It’s certainly ...