The Business-Technology Weave:

May, 2011


May 31, 2011  10:15 AM

IDRU and DAPR, Pt. I: Closing a Divide – New thinking for new realities



Posted by: David Scott
business continuity, business protections, DAPR, disaster awareness, disaster planning, IDRU, IT security

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend

May 31, 2011  9:06 AM

Cyber Warfare: Lessons for the “local” org… Yours



Posted by: David Scott
business security plan, cyber attack, cyber security, cyber security and government, cyber threat, cyber war, disaster awareness, disaster plan, disaster planning, IT security, Security Plan, security policy

 

In his excellent Wall Street Journal article,


May 26, 2011  1:09 PM

The Cloud: Forecast remains a bit cloudy for security



Posted by: David Scott
attacks on the cloud, best IT practice, cloud attacks, Cloud Computing, cloud contract, cloud security, SaaS, software as a service, the cloud

 

Several things are on the rise as concerns the Cloud.


May 23, 2011  11:58 AM

LinkedIn: Linking to Insecurity?



Posted by: David Scott
cookies, cookies expiration, hacking, identity theft, linkedin, LinkedIn security, LinkedIn security flaw, security flaw LinkedIn

 

There is a potential problem at LinkedIn – a social networking site...


May 20, 2011  12:20 PM

Sony is Hacked Again



Posted by: David Scott
anti-spyware, anti-virus, antivirus, data breach, data security, malware, online security, security policy, security practices, So-Net, Sony, sony online entertainment, Sony PlayStation, spyware, virtual points, virus removal

 

Security is not evidenced merely through the absence of harm.  A harming event may be transpiring in...


May 19, 2011  12:05 PM

Yikes: Survey Says Distractions Cost Big $$$



Posted by: David Scott
acceptable use, acceptable use policy, e-mail policy, harmon.ie, mobile phone policy, uSamp, work distractions, workplace distractions

 

Many people get distracted at work.  No, seriously, they...


May 14, 2011  1:18 PM

Facebook vs. Google: I.T. WARS indeed



Posted by: David Scott
Burson-Marsteller, Burson-Marsteller Washington, facebook, Gmail, google, personal information security, Social Circle, social networking

 

By now, many if not most people have heard about Facebook’s so-called “secret” hire of an outside public...


May 12, 2011  11:13 AM

Access, Access, Access



Posted by: David Scott
content access, content security, data access, data security, employee access, employee security, information access, information security, security training, small and medium business, small-to-medium business, smartphones and business, SMB

 

Hey, if ya can’t access it, what good is it?  Well,...


May 10, 2011  6:24 AM

The Web of Insecurity



Posted by: David Scott
enterprise security, security awareness, security developer, security development, web applications, web management, web security

 

In some quarters, it’s being estimated that most enterprise web...


May 6, 2011  11:41 AM

Sony is Sorry



Posted by: David Scott
content management, data breach, data risk, data security, internet risk, organizational security, services management, Sony, sony data breach

 

Did you ever notice the similarity between the words “Sony” and...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: