David Laceys IT Security Blog

January 2011

  • It's exploitation, not possession that counts

    David Lacey 27 Jan 2011
  • Last year we saw the beginning of a change in attitude to information security, with a growing realisation that highly sophisticated attacks (such as Stuxnet) can and do happen. The threat is now ...

  • Let's ditch best practices

    David Lacey 12 Jan 2011
  • Computerworld UK has just published an article from me combining three of my favourite thoughts. The first is that we should ditch old standards such as ISO 27001 and develop new practices. ...

  • Security Forecasts for 2011

    David Lacey 02 Jan 2011
  • What will 2011 hold for information security professionals? Last year I predicted a year of change. It did not happen. But we are incubating a major crisis: legacy systems are vulnerable; existing ...






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...