David Laceys IT Security Blog:

identity


June 3, 2011  8:46 PM

Lessons from the attack on Lockheed Martin

David Lacey David Lacey Profile: David Lacey
crisis, Governance, identity, incidents

Regardless of who got access to what (if anything) in the recent reported cyber attack against Lockheed Martin, this incident contains valuable...

May 19, 2011  3:23 PM

Keep it Simple Stupid

David Lacey David Lacey Profile: David Lacey
de-perimeterisation, identity, Security Solutions

One of the most important principles to observe in information security management is the KISS principle. Users will only accept solutions that are fast, cheap and simple. Security is a "grudge purchase". Most people aim to avoid it, or minimise the time, money or resources...


October 26, 2009  10:57 AM

Higher standards for identity assurance

David Lacey David Lacey Profile: David Lacey
Governance, identity, People

Not a week goes by without a news item about yet another breach of personal data. The latest one is a compromise of data on the Guardian newspaper's jobs website. I think we all agree that there's a pressing need for a step change in...


August 9, 2009  1:41 PM

Context is King

David Lacey David Lacey Profile: David Lacey
identity, perception

I had a few comments from friends after my last posting on Adam Laurie's attack on the UK Identity card. Many missed the point. The issue is not whether it's possible to forge or modify an Identity...


August 8, 2009  4:17 PM

Who can you believe?

David Lacey David Lacey Profile: David Lacey
identity, Professionalism

I was disturbed to read about Adam Laurie's claim that he successfully cloned and changed the data on a UK Identity Card. I was also concerned to read the Home Office response that "This story is rubbish".

...


January 27, 2009  12:23 PM

Virtual Shadows

David Lacey David Lacey Profile: David Lacey
identity, Predictions, privacy

Last night I attended the launch party for Karen Lawrence Öqvist's excellent book "Virtual Shadows: Your Privacy in the Information Society". This book is a recommended read: a well-written,...


September 8, 2008  11:26 PM

Reading between the lines

David Lacey David Lacey Profile: David Lacey
identity, incidents, Predictions, Security Solutions

The BBC News Website carries an interesting article on text message analysis. This technique is becoming a new, powerful tool for solving crime cases. It's already been used to help secure a murder conviction this year, by...


June 30, 2008  11:04 PM

In search of better Identity Management

David Lacey David Lacey Profile: David Lacey
identity, Security Solutions, Technology

Last week I met up with Microsoft to catch up with their progress in developing a better, user-centric identity infrastructure.

Microsoft's journey started with an ambitious but ill-fated venture called Hailstorm, which aimed to implement a secure, global identity system, but misjudged...


June 3, 2008  9:20 AM

The Cost of Data Breaches

David Lacey David Lacey Profile: David Lacey
crisis, economics, identity, incidents

I see that yet another bank has come clean about a loss of personal data information. This time it's Bank of New York Mellon. They have admitted to losing tapes containing personal details of 4.5 million customers....


March 30, 2008  12:52 PM

Raising the Issues of Biometrics

David Lacey David Lacey Profile: David Lacey
Authentication, identity, perception

It’s reported in The Register that the latest edition of the Chaos Computer Club’s magazine contains a copy of the fingerprint of Wolfgang Schauble, the German Interior Minister. The image...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: