David Laceys IT Security Blog

April 2010

  • Convergence of Physical and IT Security risks

    David Lacey 21 Apr 2010
  • I note that Convergence is back on the conference agenda, with a keynote panel, chaired by Dr David King, scheduled for the opening morning of next week's Infosecurity Europe. Keen supporters of ...

  • Passwords and the cost of security

    David Lacey 14 Apr 2010
  • A friend of mine drew my attention to an interesting article on the Boston Globe website which suggests our security advice to users is (literally) a waste of time. The feature was prompted by the ...

  • Time for mandatory standards for data quality

    David Lacey 11 Apr 2010
  • The recent report of the UK National Health Service confirming 21 cases in which the wrong organs may have been taken from donors because of data handling errors reflects a much wider problem of ...

  • Nature knows best

    David Lacey 11 Apr 2010
  • I've always believed that some of the best ideas for security can be found in nature. Death and sex, for example, hold essential lessons for systems survivability. The latest example of this type ...

  • The real economics of security

    David Lacey 01 Apr 2010
  • The Internet Security Alliance (ISA) and the American National Standards Institute (ANSI) have just published a guide "The Financial Management of Cyber Risk: An Implementation Framework for CFOs". ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close