The Business-Technology Weave:

November, 2010


November 30, 2010  11:14 AM

Content Continued: Minimizing exposure and liability



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

[Note:  If you haven’t yet, you may wish to start with “

November 30, 2010  10:16 AM

Content, Use and Control



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

In view of the recent WikiLeaks leak (


November 29, 2010  10:13 AM

Content: Getting it; Using it; Re-using it; and Getting Rid of It (Protection, too!)



Posted by: David Scott
business agility, business and IT policy, business and IT change, business and IT planning, business practice, business systems, content, content management, content management system, data management, data protection, leveraging data, WikiLeaks

 

I’ve struck a nerve in...


November 29, 2010  9:44 AM

WikiLeaks: Lessons of Content and Its Management for the Organization



Posted by: David Scott
content, content management, data, data access, data backup, data breach, data theft, national security, state department cables, U.S. security, WikiLeaks

 

Security and data breaches are overwhelmingly due to human...


November 28, 2010  11:00 AM

‘Tis the Season… to be… Careful



Posted by: David Scott
black friday, Christmas, Christmas shopping, cyber monday, cyber shopping, etailing, online retail, online retailing

 

What comes after Black Friday? ...


November 27, 2010  10:50 AM

Continuing the Online Challenge



Posted by: David Scott
cloud applications, cloud apps, internet applications, internet apps, ISP, the cloud, the internet, the online challenge

 

A couple posts ago, we spoke of the importance of defining what...


November 23, 2010  11:29 AM

Don’t Be a Blockhead: Block… or Define…



Posted by: David Scott
applications, blocking applications, blocking apps, business policy, facebook, IT policy, third-party apps, unauthorized applications, unauthorized apps

 

What’s a poor IT leader to do?  Whether you’re CIO/CTO, IT Director, IT Manager, Network Manager, Programmer, Business...


November 22, 2010  11:42 AM

Watch that content, Bub…



Posted by: David Scott
blog, blogging, COICA, Combating Online Infringement and Counterfeits Act, content, copyright, copyright infringement, web content

  Hmmm… word comes that the Senate Judiciary Committee approved a bill that should be of concern to any website, and any content provider:  It would grant the Attorney General the right to shut down offending websites...


November 17, 2010  8:54 AM

Half of All Organizations Ban Access to Social Networking Sites



Posted by: David Scott
AOL, business policy, business practice, facebook, facebook e-mail, facebook email, IT policy, IT practice, myspace, social networking

Interesting news comes to us that half, or slightly more depending on the survey, of all organizations are banning access to social networking sites.  (You may wish to see my earlier...


November 4, 2010  12:04 PM

Policy and Planning in View of Risk’s Velocity



Posted by: David Scott
business and IT policy, business and IT planning, business planning, business plans, business policy, business risk, IT planning, IT plans, IT policy, IT risk, risk analysis, security policy, velocity of risk

 

[Note:  You may wish to see


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: