David Laceys IT Security Blog
Recent Posts
-
Special skills for special security problems
22 Sep 2014 -
We need to speed up security
05 Sep 2014 -
Meetings with remarkable security men
27 Jun 2014
I was pleased to read in the Sunday Telegraph that GCHQ values the security skills of dyslexic young people, employing over 100 dyslexic and dyspraxic neuro-diverse analysts. I fully support this ...
I'm finally back blogging after a delightful summer break. Surprisingly, not a lot has changed in the cyber security world. Big security breaches have been surprisingly thin on the ground. And most ...
This week Doc Hugh Thompson of RSA fame was in London. We had an interesting and entertaining debate on current and future trends. Hugh is a consummate, multi-tasking professional: lecturer in ...
-
Ten answers to cyber security
23 Jun 2014 -
Ten top experts and ten steps backwards
22 Jun 2014 -
Frameworks, Bloody Frameworks
11 Jun 2014 -
The future of mobile? Bright but cloudy
05 Jun 2014 -
No progress on the conference front
16 May 2014 -
Testing can be fun
25 Apr 2014 -
The Electronic Pearl Harbour gets a step closer
20 Apr 2014
My last posting was perhaps a bit too negative. I should correct that by setting out my own solutions to cyber security. Here are my ten answers. Invest more public money into imaginative new ...
I was fascinated to see that the latest issue of Forbes magazine has a feature on cyber security. It sets out what must be fixed according to ten top experts. Have they got it right? The answer ...
Last night a friend sent me an email drawing attention to the UK Government's new cyber security scheme. This one is called "Cyber Essentials". So what's new? And what does it offer? The answer is ...
Tuesday evening saw the London launch of IDATE's 2014 version of their DigiWorld Yearbook, an excellent guide to telecoms, Internet and media markets. It was a useful opportunity to catch up with ...
It's remarkable that in the face of the most sophisticated espionage threats, the most capable cyber-criminals, and the most severe compliance requirements ever experienced, the cyber security ...
It's interesting how many people are attracted to penetration testing, thinking it's more interesting and fun than conventional product testing, They're wrong. Scanning platforms for ...
As I expected we keep finding more and more security vulnerabilities in devices that shouldn't have them: essential control systems that govern the safety of critical infrastructure. The latest ...
-
Security: From Theoretical Business Enabler to Essential Overhead
20 Apr 2014 -
Compliance is not security but has its place
04 Apr 2014 -
Research does not guarantee innovation
21 Feb 2014 -
Yet another contents list
16 Feb 2014 -
Let's get real about cyber security
23 Jan 2014
Dropped through my door last week was the flyer advertising Infosecurity Europe 2014. The theme is "Security as a business enabler - are you fit for 2014?" It is an unfortunate choice of words, ...
Several weeks ago an Australian friend of mine sent me a delightful note pointing out how recent events and media reporting had confirmed some controversial points I had made last year in the ...
Earlier this week I attended the excellent Stevenson Science lecture at Royal Holloway University on "The Birth of Machine Cryptanalysis at Bletchley Park" given by Dr Joel Greenberg of the ...
For the past decade the real enemy of security practitioners has not been the hackers and malware that threaten our systems but the numerous best practices, compliance demands and audit actions ...
This week I was speaking at FIC 2014, a leading French International Conference attended by 3,000 people, including Ministers, privacy experts and leading CSOs. It was refreshing, prompted by a ...