The Business-Technology Weave:

April, 2011

April 30, 2011  6:10 AM

No One Ever Talks About the Positive Aspects of Breaches…

Posted by: David Scott
data breach, data breach expense, data security, human error, social security numbers exposed, ssn exposed, susan combs, texas data breach, texas state comptroller


Ok, I’m being a little facetious. ...

April 29, 2011  12:04 PM

Ahhh, New York City you talk a lot; let’s have a look at ya…

Posted by: David Scott
access security, best security practice, business breach, business security plan, computer security, content management, content security, cost of data breach, cyber security, data breach, data disclosure, data exposure, data security, enterprise security, human error, New York Yankees, New York Yankees data breach, NY Yankees, NY Yankees data breach, security breach


(With apologies to Mick Jagger/Rolling Stones -  NYC,...

April 28, 2011  7:44 AM

Security, Sony, and Station (PlayStation), Part 45

Posted by: David Scott
authentication, authentication questions, cost of data breach, credential information, credentialing information, credit card breach, credit card data, data breach, data breach expense, data compromise, data control, ID, login, password, playstation, Sony, Sony PlayStation, user data, user ID


Just kidding – it’s only Part 2.  (Please see first...

April 27, 2011  11:07 AM

Security, Sony, and Station (PlayStation)

Posted by: David Scott
breach of credit card, cost of data breach, credit card breach, data breach, data breach expense, data security, e-mail spoof, online spoof, playstation breach, Sony, sony breach, Sony PlayStation, spoof

Oh oh (again).  Sony says that sometime between April...

April 25, 2011  11:57 AM

In the Dark: Folks are just now catching up to The BTW

Posted by: David Scott
best business practice, business ability, business adaptability, business alignment, business and IT policy, business and IT planning, business and IT solutions, business breach, business challenge, business continuity, cyber attack, cyber security, cyber threat, cyber training, cyber war, cyberwar, DAPR, disaster awareness, disaster awareness preparedness and recovery, disaster plan, disaster prevention, disaster recovery planning, DR, DR planning, in the dark, in the dark: crucial industries confront cyber attacks


Not to sound too forward-thinking, but McAfee just released an interesting...

April 22, 2011  10:16 AM

Uh Oh: Google and Apple are Collecting Information about YOU

Posted by: David Scott
Apple, apple google collect personal information, collection of personal information, data breach, data collection, data theft, google, personal information, service provider, streetview, unwarranted data collection


I don’t use an iPhone, and my use of Google is strictly in my home, as opposed to using it on my particular...

April 18, 2011  11:30 AM

Uh Oh: Government Sponsored Internet ID Plan?

Posted by: David Scott
cyber security, federal government breach, government breach, identity ecosystem, identity theft, internet ID, National Strategy for Trusted Identities in Cyberspace, online security


No partisan ruminations here:  We IT and Business folk are...

April 18, 2011  9:40 AM

More Clouds in the Cloud – Consider DropBox

Posted by: David Scott
application as a service, cloud access, cloud applications, cloud apps, cloud security, cloud services, cloud vulnerabilities, computing as a service, data as a service, hardware as a service, IT security, platform as a service, software as a service, the cloud


I hate to sound prescient, but these Cloud apps, services, and storage areas...

April 11, 2011  11:25 AM

Sobering: Cyber Security and Government

Posted by: David Scott
content management, cyber attack, cyber security, cyber security and government, data breach, data corruption, data loss, data theft, epsilon, government data, government data breach


It was so tempting to title this,...

April 9, 2011  11:36 AM

In The Cloud, and… In-Accessible?

Posted by: David Scott
centralized data, cloud, cloud applications, cloud apps, cloud reliability, cloud security, data, data access, data accessibility, data backup, data breach, data breach expense, data compromise, data control, data integrity, data loss, data loss prevention, data management, data security, offsite backup, offsite data, the cloud


I was doing a bit of reading regarding Amazon’s new Amazon Cloud...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: