
Sapsiwai - Fotolia
David Laceys IT Security Blog
Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.
July 2009
-
Safeguarding the DNA of the Internet
29 Jul 2009 -
Both sides now
27 Jul 2009 -
Security and banks
27 Jul 2009
A few postings ago I mentioned the growing importance of random acts of kindness by unsung heroes in rescuing or maintaining vital Internet services. Make no mistake; this is the future of ...
As Joni Mitchell might have put it, you can look at cloud computing from two sides now. On the one hand they can introduce a worrying uncertainty as to where your data is stored and who might have ...
According to recent research by Gartner, consumers regard security as the most important feature in online banking. That's a pretty obvious finding. Security is the cornerstone of banking. ...
-
Improving security in the clouds
24 Jul 2009 -
Exploiting the power of networks
23 Jul 2009 -
How many lost laptops can you justify?
20 Jul 2009 -
Getting the basics right
20 Jul 2009 -
Doing nothing is not an option
18 Jul 2009 -
Information security at the crossroads
17 Jul 2009 -
How to be a Superbrand
15 Jul 2009
A posting on Bruce Schneier's blog drew my attention to this interesting case study of how a hacker was able to gain access to the personal accounts of Twitter executives. There's nothing new here ...
For several years I've been preaching that the key to effective security management is to harness the power of social networks to help identify risks and prevent or respond to incidents. My book ...
I was interested to read the figures published last week about the number of laptops that went missing last year from government departments. I've been tracking this problem for the past decade and ...
This week's Economist includes an interesting feature on the failure of economics. It addresses three main critiques: that macro and financial economists helped cause the credit crisis, that they ...
Erudine have just published the latest edition of Engine, their excellent technology magazine. The theme of this edition is 'Legacy Evolution' and it contains some excellent articles from CIOs, ...
Infosecurity have added a few more experts to their list of guest bloggers, including Howard Schmidt and myself. I've just posted a short article on the current status of information security ...
I was interested to read that Microsoft has overtaken Google to top the latest UK consumer survey of leading brands. The three criteria used were quality, reliability and distinction. These are not ...
-
Security in the clouds
13 Jul 2009 -
Secrets for sale
09 Jul 2009 -
Environments influence behaviour
05 Jul 2009 -
The perils of security software
05 Jul 2009
We've seen a fair bit of media coverage over the last week about the launch of Google's new Chrome operating system, and how this will herald a new era of cloud computing. One thing that's ...
The claim in today's Guardian newspaper about journalists employing private detectives to use illegal means of gathering information on celebrities comes as no surprise. This has been going on for ...
Some interesting experiments in Holland have confirmed that many people adjust their behaviour according to the people and environment around them. In this research it was a case of graffiti ...
Some security software needs to be labeled with a hazard warning, because it can do immense damage when it goes wrong. Security software glitches can trash client machines, close down access to ...