
Sapsiwai - Fotolia
David Laceys IT Security Blog
Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.
July 2008
-
Cyberspace profiling
30 Jul 2008 -
Keeping threats in perspective
24 Jul 2008 -
Who needs infrastructure?
21 Jul 2008
I'm always fascinated by anything new of the topic of criminal profiling, the so-called "third wave" of investigative science. Geographical profiling, in particular, is surprisingly effective. So I ...
An email from Techtarget drew my attention to a response by Michael Cobb to a question about the vulnerability of encryption systems, following revelations by researchers at Princeton University ...
I was interested to read that Westminster City Council is planning to be infrastructure-free by 2015, by outsourcing all IT services. It's refreshing to find an organisation that's prepared to ...
-
Talent wars are zero sum games
17 Jul 2008 -
In search of a new security culture
14 Jul 2008 -
Network Access Control
09 Jul 2008 -
How many laptops go missing?
05 Jul 2008
JP Rangaswami, Managing Director of BT Design, gave an excellent speech last night on the "The Future of Corporate Information" at the Computer Weekly 500 Club. JP is a superb, original thinker and ...
Regular visitors will have noticed that my postings have been a bit thin lately. It's because I've been head-down completing a new book on "Managing the Human Factor in Information Security", to be ...
This month's SC magazine has some rather critical quotes of mine in a feature on Network Access Control. I'm not completely negative about it. It's a useful tool in the security manager's armoury, ...
A recent Dell-sponsored survey carried out by the Ponemon Institute suggests that more than 10,000 laptops go missing each week at 36 of the largest US airports, many stolen at security check ...