The Business-Technology Weave:

April, 2011


April 30, 2011  6:10 AM

No One Ever Talks About the Positive Aspects of Breaches…



Posted by: David Scott
data breach, data breach expense, data security, human error, social security numbers exposed, ssn exposed, susan combs, texas data breach, texas state comptroller

 

Ok, I’m being a little facetious. ...

April 29, 2011  12:04 PM

Ahhh, New York City you talk a lot; let’s have a look at ya…



Posted by: David Scott
access security, best security practice, business breach, business security plan, computer security, content management, content security, cost of data breach, cyber security, data breach, data disclosure, data exposure, data security, enterprise security, human error, New York Yankees, New York Yankees data breach, NY Yankees, NY Yankees data breach, security breach

 

(With apologies to Mick Jagger/Rolling Stones -  NYC,...


April 28, 2011  7:44 AM

Security, Sony, and Station (PlayStation), Part 45



Posted by: David Scott
authentication, authentication questions, cost of data breach, credential information, credentialing information, credit card breach, credit card data, data breach, data breach expense, data compromise, data control, ID, login, password, playstation, Sony, Sony PlayStation, user data, user ID

 

Just kidding – it’s only Part 2.  (Please see first...


April 27, 2011  11:07 AM

Security, Sony, and Station (PlayStation)



Posted by: David Scott
breach of credit card, cost of data breach, credit card breach, data breach, data breach expense, data security, e-mail spoof, online spoof, playstation breach, Sony, sony breach, Sony PlayStation, spoof

Oh oh (again).  Sony says that sometime between April...


April 25, 2011  11:57 AM

In the Dark: Folks are just now catching up to The BTW



Posted by: David Scott
best business practice, business ability, business adaptability, business alignment, business and IT policy, business and IT planning, business and IT solutions, business breach, business challenge, business continuity, cyber attack, cyber security, cyber threat, cyber training, cyber war, cyberwar, DAPR, disaster awareness, disaster awareness preparedness and recovery, disaster plan, disaster prevention, disaster recovery planning, DR, DR planning, in the dark, in the dark: crucial industries confront cyber attacks

 

Not to sound too forward-thinking, but McAfee just released an interesting...


April 22, 2011  10:16 AM

Uh Oh: Google and Apple are Collecting Information about YOU



Posted by: David Scott
Apple, apple google collect personal information, collection of personal information, data breach, data collection, data theft, google, personal information, service provider, streetview, unwarranted data collection

 

I don’t use an iPhone, and my use of Google is strictly in my home, as opposed to using it on my particular...


April 18, 2011  11:30 AM

Uh Oh: Government Sponsored Internet ID Plan?



Posted by: David Scott
cyber security, federal government breach, government breach, identity ecosystem, identity theft, internet ID, National Strategy for Trusted Identities in Cyberspace, online security

 

No partisan ruminations here:  We IT and Business folk are...


April 18, 2011  9:40 AM

More Clouds in the Cloud – Consider DropBox



Posted by: David Scott
application as a service, cloud access, cloud applications, cloud apps, cloud security, cloud services, cloud vulnerabilities, computing as a service, data as a service, hardware as a service, IT security, platform as a service, software as a service, the cloud

 

I hate to sound prescient, but these Cloud apps, services, and storage areas...


April 11, 2011  11:25 AM

Sobering: Cyber Security and Government



Posted by: David Scott
content management, cyber attack, cyber security, cyber security and government, data breach, data corruption, data loss, data theft, epsilon, government data, government data breach

 

It was so tempting to title this,...


April 9, 2011  11:36 AM

In The Cloud, and… In-Accessible?



Posted by: David Scott
centralized data, cloud, cloud applications, cloud apps, cloud reliability, cloud security, data, data access, data accessibility, data backup, data breach, data breach expense, data compromise, data control, data integrity, data loss, data loss prevention, data management, data security, offsite backup, offsite data, the cloud

 

I was doing a bit of reading regarding Amazon’s new Amazon Cloud...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: