
Sapsiwai - Fotolia
David Laceys IT Security Blog
Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.
October 2010
-
Next generation security technology
31 Oct 2010 -
Can critical infrastructure be secured without standards?
26 Oct 2010 -
Preparing for the next decade
24 Oct 2010
Many years ago, I predicted the death of the firewall. Many people were surprised at this statement. Firewalls were seen as an essential line of defence. But it was clear, even then, that simple ...
According to Computerworld, the Australian Federal Attorney-General's Department has ruled out regulation of security standards for supervisory control and data acquisition (SCADA) systems for ...
Last week the ISSA-UK advisory board met at the House of Commons for dinner with a number of invited security luminaries to discuss the prospects for information security over the next decade. The ...
-
Countering cyber attacks
18 Oct 2010 -
Reflections on RSA Conference 2010
15 Oct 2010 -
The perils of security metrics
11 Oct 2010 -
Risk communications that hit home
11 Oct 2010 -
Security for Small/Medium Sized Organisations
05 Oct 2010 -
Waking up to the emerging cyber security threat landscape
04 Oct 2010
It's good to read that the UK Government is finally waking up to the fact that cyber attacks are a serious threat to the nation. In fact it's always been so. Why? Because we don't build secure ...
The improving value of the British pound against the dollar makes visits to the USA more attractive. But if you just wish to experience the culture, you need to go no further than London Hilton ...
Levels of spam are currently down, quite substantially. It's reportedly because a major source has gone off the air. But has the threat gone away? Unfortunately not. In fact, it illustrates one of ...
The most effective risk communications focus on consequences that are personal, immediate and certain. Authority, confidence and a small amount of exaggeration can help. So how about this ...
Earlier this year I conducted research, on behalf of the Information Commissioner's Office, into the security requirements of small/medium sized enterprises, working with Barry James, a developer ...
My blog has been very quiet lately as I've been on vacation. I seem to have come back to a changed world, one which has woken up to the reality that industrial process supervisory systems are ...