Sapsiwai - Fotolia

David Laceys IT Security Blog

Information security expert David Lacey discussed the latest ideas, best practices, and business issues associated with managing security.

November 2010

  • The Laws of Information Security

    David Lacey 23 Nov 2010
  • Andrew Yeomans reminded me of Peter Cochrane's Real Laws of Information Security. Inspired by these, I decided to create my own. The purpose of an information security programme is to cover the ...

  • Dual purpose technologies

    David Lacey 22 Nov 2010
  • The interesting thing from a security perspective about new technologies is that they solve as many problems as they create. Cloud computing and virtualization are great examples of that, providing ...

  • It's the instrumentation, stupid

    David Lacey 19 Nov 2010
  • I prefer to avoid clichés, but this snowclone heading seems to best capture the missing dimension in the current debate on cyber defence. Judging by the latest tome from Chatham House, we can ...

  • In search of innovation

    David Lacey 15 Nov 2010
  • A colleague of mine recently commented on the 'herd behaviour' that has become commonplace in the information security community. It's a dangerous trend, which stifles innovation. And it's often ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close