David Laceys IT Security Blog

Recent Posts

  • Improving data quality

    David Lacey 29 Mar 2010
  • For most of my career I've been concerned about the poor quality of most of our databases. It's been bad in most organisations I've encountered, and it's likely to get progressively worse with ...

  • Head in the Clouds Computing

    David Lacey 23 Mar 2010
  • The Centre for the Protection of National Infrastructure (CPNI) has just published a briefing note on Cloud Computing, compiled by Deloitte. It's a useful snapshot of the latest fashions and jargon ...

  • Encouraging SMEs to address security

    David Lacey 18 Mar 2010
  • I've been busy over the last week finalising some interesting research work for the Information Commissioner's Office on security advice for SMEs. It has some groundbreaking recommendations. ...

  • Why we are vulnerable to cyber attacks

    David Lacey 08 Mar 2010
  • The news today has several reports of a recent surge in cyber attacks originating in China. The Times quotes US analysts as saying that the West had no effective response and that EU systems were ...

  • Cloud Security Challenge

    David Lacey 06 Mar 2010
  • I encounter many innovative start-up companies who exist solely on grants and awards. Without this support we simply wouldn't have the range of products that we desperately need to solve emerging ...

  • What's different about Cloud Computing

    David Lacey 03 Mar 2010
  • My blog posting yesterday, criticising the Cloud Security Alliance's paper on Top Threats to Cloud Computing created a few comments and discussions on whether the risks are actually any different ...

  • Top Threats to Cloud Computing?

    David Lacey 02 Mar 2010
  • When is a threat not a threat? The answer is when it's selected by someone who does not understand the correct terminology. In fact this happens a lot when you ask ordinary business managers to ...

  • The impact of cyber attacks

    David Lacey 22 Feb 2010
  • I was concerned to note that The Register claims to have seen a private report compiled by GCHQ's new 'Cyber Security Operations Centre' for the Cabinet Office, claiming that a digital attack on ...

  • The perils of electronic voting

    David Lacey 15 Feb 2010
  • Claims that Goldman Sachs bankers might have attempted to manipulate a public vote on a tax on banking transactions illustrates three important information age trends. The first is that, whether we ...

  • Publicity we can all do without

    David Lacey 11 Feb 2010
  • Publicity-seeking security researchers are a welcome boost to journalists, but they are a pain for serious security practitioners who spend many years developing and justifying security solutions ...

  • Privacy requires more than best endeavours

    David Lacey 10 Feb 2010
  • I was interested to read reports that Shahrukh Khan claims to have autographed naked images of his body captured on scanners by Heathrow security staff. No amount of rules, training and procedures ...

  • Unlimited liability

    David Lacey 31 Jan 2010
  • My expert legal friend Dai Davis of law firm Brooke North LLP drew my attention to a recent ruling in a legal case involving a claim by BSkyB against EDS, who supplied them with a customer ...

  • Social engineering through social networks

    David Lacey 26 Jan 2010
  • There's an interesting story in the Financial Times about how the attacks on Google may have been engineered through social networks of targeted employees, posing as friends in order to persuade ...

  • The fascinating world of digital investigations

    David Lacey 25 Jan 2010
  • Out of all the press coverage about the recent hacking of Google systems by Far Eastern hackers, the one that caught my attention was the description by Secure Works of the digital investigation of ...

  • The world of outsourcing, off-shoring and cloud computing

    David Lacey 25 Jan 2010
  • Regular readers of this blog might have noticed a distinct lack of activity this last month. That's been largely down to the fact that every hour of my available time has been occupied in ...

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close