David Laceys IT Security Blog

July 2010

  • Security in an information age

    David Lacey 27 Jul 2010
  • This month's news has highlighted three developments that reflect the changing nature of the security landscape. The expulsion of Russian spies demonstrates the limitations of cold war tradecraft ...

  • Economic incentives for cyber security

    David Lacey 13 Jul 2010
  • I read that US Cyber Czar Howard Schmidt is scheduled to hold a meeting on Wednesday with Secretary of Commerce Gary Locke and Department of Homeland Security Secretary Janet Napolitano, where he ...

  • e-Crime Wales Summit 2010

    David Lacey 13 Jul 2010
  • If you're interested in tracking the proceedings at Thursday's e-Crime conference in Wales, there's a live blog with session highlights and a Twitter feed (use the hashtag #ecrimewales). You can ...

  • Wales shows the way in the fight against e-Crime

    David Lacey 12 Jul 2010
  • This Thursday, e-Crime Wales is holding its annual e-Crime Summit at the Celtic Manor Resort in Newport. It has become one of the major security events of the year, attracting excellent speakers ...

  • The Art of Cyberwar

    David Lacey 02 Jul 2010
  • The latest edition of the Economist has a major feature on Cyberwar, complete with a sensational image of an explosion in a civilian area, as well as a fascinating tale of a logic bomb. ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close