The Business-Technology Weave:

May, 2011

May 31, 2011  10:15 AM

IDRU and DAPR, Pt. I: Closing a Divide – New thinking for new realities

Posted by: David Scott
business continuity, business protections, DAPR, disaster awareness, disaster planning, IDRU, IT security


  Bookmark and Share     0 Comments     RSS Feed     Email a friend

May 31, 2011  9:06 AM

Cyber Warfare: Lessons for the “local” org… Yours

Posted by: David Scott
business security plan, cyber attack, cyber security, cyber security and government, cyber threat, cyber war, disaster awareness, disaster plan, disaster planning, IT security, Security Plan, security policy


In his excellent Wall Street Journal article,

May 26, 2011  1:09 PM

The Cloud: Forecast remains a bit cloudy for security

Posted by: David Scott
attacks on the cloud, best IT practice, cloud attacks, Cloud Computing, cloud contract, cloud security, SaaS, software as a service, the cloud


Several things are on the rise as concerns the Cloud.

May 23, 2011  11:58 AM

LinkedIn: Linking to Insecurity?

Posted by: David Scott
cookies, cookies expiration, hacking, identity theft, linkedin, LinkedIn security, LinkedIn security flaw, security flaw LinkedIn


There is a potential problem at LinkedIn – a social networking site...

May 20, 2011  12:20 PM

Sony is Hacked Again

Posted by: David Scott
anti-spyware, anti-virus, antivirus, data breach, data security, malware, online security, security policy, security practices, So-Net, Sony, sony online entertainment, Sony PlayStation, spyware, virtual points, virus removal


Security is not evidenced merely through the absence of harm.  A harming event may be transpiring in...

May 19, 2011  12:05 PM

Yikes: Survey Says Distractions Cost Big $$$

Posted by: David Scott
acceptable use, acceptable use policy, e-mail policy,, mobile phone policy, uSamp, work distractions, workplace distractions


Many people get distracted at work.  No, seriously, they...

May 14, 2011  1:18 PM

Facebook vs. Google: I.T. WARS indeed

Posted by: David Scott
Burson-Marsteller, Burson-Marsteller Washington, facebook, Gmail, google, personal information security, Social Circle, social networking


By now, many if not most people have heard about Facebook’s so-called “secret” hire of an outside public...

May 12, 2011  11:13 AM

Access, Access, Access

Posted by: David Scott
content access, content security, data access, data security, employee access, employee security, information access, information security, security training, small and medium business, small-to-medium business, smartphones and business, SMB


Hey, if ya can’t access it, what good is it?  Well,...

May 10, 2011  6:24 AM

The Web of Insecurity

Posted by: David Scott
enterprise security, security awareness, security developer, security development, web applications, web management, web security


In some quarters, it’s being estimated that most enterprise web...

May 6, 2011  11:41 AM

Sony is Sorry

Posted by: David Scott
content management, data breach, data risk, data security, internet risk, organizational security, services management, Sony, sony data breach


Did you ever notice the similarity between the words “Sony” and...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: