David Lacey Contributor - ComputerWeekly.com blog David Lacey is an IT security consultant and blogs for ComputerWeekly.com. David Lacey’s Most Recent Content ComputerWeekly.com Calling the odds 20 May 2016 ComputerWeekly.com Putting the SEC into DEVOPS 24 Apr 2016 ComputerWeekly.com David Laceys IT Security Blog 20 Apr 2016 ComputerWeekly.com Forecasts for 2016 22 Dec 2015 ComputerWeekly.com In praise of the Digital Catapult 17 Jun 2015 ComputerWeekly.com What's new in Cyber security? 15 Jun 2015 ComputerWeekly.com Minimising the snooping 01 Mar 2015 ComputerWeekly.com Cyber security in Britain 12 Feb 2015 ComputerWeekly.com Showing our true character? 08 Feb 2015 ComputerWeekly.com If you can't beat them... 03 Feb 2015 ComputerWeekly.com Predictions for 2015 25 Jan 2015 ComputerWeekly.com Cyber terrorism is a step closer 22 Dec 2014 ComputerWeekly.com Predictions for 2014 - how did I do? 18 Dec 2014 ComputerWeekly.com One day wonders 23 Oct 2014 ComputerWeekly.com Security and the Internet of Things 23 Oct 2014 ComputerWeekly.com Special skills for special security problems 22 Sep 2014 ComputerWeekly.com We need to speed up security 05 Sep 2014 ComputerWeekly.com Meetings with remarkable security men 27 Jun 2014 ComputerWeekly.com Ten answers to cyber security 23 Jun 2014 ComputerWeekly.com Ten top experts and ten steps backwards 22 Jun 2014 ComputerWeekly.com Frameworks, Bloody Frameworks 11 Jun 2014 ComputerWeekly.com The future of mobile? Bright but cloudy 05 Jun 2014 ComputerWeekly.com No progress on the conference front 16 May 2014 ComputerWeekly.com Testing can be fun 25 Apr 2014 ComputerWeekly.com The Electronic Pearl Harbour gets a step closer 20 Apr 2014 ComputerWeekly.com Security: From Theoretical Business Enabler to Essential Overhead 20 Apr 2014 ComputerWeekly.com Compliance is not security but has its place 04 Apr 2014 ComputerWeekly.com Research does not guarantee innovation 21 Feb 2014 ComputerWeekly.com Yet another contents list 16 Feb 2014 ComputerWeekly.com Let's get real about cyber security 23 Jan 2014 ComputerWeekly.com Farewell Sir Christopher Chataway 19 Jan 2014 ComputerWeekly.com The world in 2018 (or not) 22 Dec 2013 ComputerWeekly.com Predictions for 2014 21 Dec 2013 ComputerWeekly.com Predictions for 2013 - what did I get right? 15 Dec 2013 ComputerWeekly.com Qualys - A force to be reckoned with 26 Nov 2013 ComputerWeekly.com Security in a Land Down Under 26 Nov 2013 ComputerWeekly.com Jericho Forum declares success 23 Oct 2013 ComputerWeekly.com Visions of the Future 20 Oct 2013 ComputerWeekly.com Life beyond consultancy 19 Oct 2013 ComputerWeekly.com APT Protection via Data-Centric Security 19 Oct 2013 ComputerWeekly.com Even more on the History of BS7799 16 Oct 2013 ComputerWeekly.com Business understanding of cyber attacks a decade out of date 16 Oct 2013 ComputerWeekly.com How to manage the risks of Advanced Persistent Threats (APTs) 13 Oct 2013 ComputerWeekly.com More on the history of BS7799 13 Oct 2013 ComputerWeekly.com Back to reality 13 Oct 2013 ComputerWeekly.com It was 20 years ago today... 19 Aug 2013 ComputerWeekly.com Farewell Barnaby Jack 26 Jul 2013 ComputerWeekly.com The art of strategic crisis management 23 Jul 2013 ComputerWeekly.com Security versus privacy - a difficult and uncomfortable balance 18 Jul 2013 ComputerWeekly.com Information security for non-technical managers 18 Jul 2013 ComputerWeekly.com Where next for the enterprising CISO? 13 Jul 2013 ComputerWeekly.com SCADA security requires a better understanding of how plants work 04 Jul 2013 ComputerWeekly.com Whither Cyber Security 29 Jun 2013 ComputerWeekly.com Learning points from Advanced Persistent Threats 16 Apr 2013 ComputerWeekly.com User access control: Fundamental but forgotten 14 Mar 2013 ComputerWeekly.com Lessons from Software Development 03 Feb 2013 ComputerWeekly.com Big Data means Big Security 26 Jan 2013 ComputerWeekly.com Ditch the Triangle and use more technology 20 Jan 2013 ComputerWeekly.com A poem for Christmas and New Year 26 Dec 2012 ComputerWeekly.com Predictions for 2013 24 Dec 2012 ComputerWeekly.com Forecasts for 2012 20 Dec 2012 ComputerWeekly.com Towards real -time security 23 Nov 2012 ComputerWeekly.com Computer says No 29 Oct 2012 ComputerWeekly.com Reflections on RSA Europe 2012 13 Oct 2012 ComputerWeekly.com RSA Conference Europe 2012 07 Oct 2012 ComputerWeekly.com Media Trends in Cyber Security 05 Sep 2012 ComputerWeekly.com One size should not fit all 22 Jul 2012 ComputerWeekly.com Personal Continuity Planning 08 Jul 2012 ComputerWeekly.com The Truth about Cyber Security 17 Jun 2012 ComputerWeekly.com The Wild Western Art of War 15 May 2012 ComputerWeekly.com Impressions from the East 13 May 2012 ComputerWeekly.com Security Think Tank: Business cannot outsource accountability 10 May 2012 ComputerWeekly.com Reflections on Infosecurity Europe week 28 Apr 2012 ComputerWeekly.com Death by a thousand facts 24 Apr 2012 ComputerWeekly.com What's the point of a management system? 22 Apr 2012 ComputerWeekly.com Oxford takes an interesting lead 09 Apr 2012 ComputerWeekly.com Meeting the demands of the contemporary security market 09 Apr 2012 ComputerWeekly.com The wrong type of loop 21 Feb 2012 ComputerWeekly.com Our only hope lies with Academia 17 Feb 2012 ComputerWeekly.com Business continuity management for small companies 15 Feb 2012 ComputerWeekly.com Trust and Society 14 Feb 2012 ComputerWeekly.com Up close and personal 14 Feb 2012 ComputerWeekly.com Boutique consultancies are back in fashion 08 Feb 2012 ComputerWeekly.com Time to come clean about the state of our security 18 Jan 2012 ComputerWeekly.com Six security forecasts for 2012 29 Dec 2011 ComputerWeekly.com Security Forecasts for 2011 - Right or Wrong? 26 Dec 2011 ComputerWeekly.com No fix in sight for SCADA security 16 Dec 2011 ComputerWeekly.com Small businesses need better security advice 13 Dec 2011 ComputerWeekly.com Following the rules of the game 11 Dec 2011 ComputerWeekly.com Communicating information quickly and efficiently 10 Dec 2011 ComputerWeekly.com Another elephant in the Cloud 07 Dec 2011 ComputerWeekly.com A small step for the UK Government 29 Nov 2011 ComputerWeekly.com The Future is in fashion 24 Nov 2011 ComputerWeekly.com Six myths of risk assessment 24 Nov 2011 ComputerWeekly.com Time for small companies to get secure 21 Nov 2011 ComputerWeekly.com What tangled webs we weave 18 Nov 2011 ComputerWeekly.com Security for small businesses 08 Nov 2011 ComputerWeekly.com Preaching in a security wilderness 05 Nov 2011 ComputerWeekly.com Information Security around the World 31 Oct 2011 ComputerWeekly.com Reflections on RSA Europe 2011 15 Oct 2011 1 2 3 4 5 6 7