The Business-Technology Weave:

September, 2012

1

September 30, 2012  4:30 PM

Data Breach and Legislation: What’s Coming Your Way?



Posted by: David Scott
data legislation

  It’s rather...

September 30, 2012  4:21 PM

Cyber-terror, Hacktivism, etc.: New thoughts on security for the modern organization



Posted by: David Scott
1 year plan

The Washington Post recently reported that foreign hackers disabled a pump at an Illinois water plant last week, according to the preliminary state report. If the source of the attack is confirmed as foreign, it will be the first known attack on a critical public (that is, societal) support:...


September 30, 2012  4:15 PM

Internet Law: Contracts and Privacy – Pt. II



Posted by: David Scott
Internet Law, Terms of Use

[Read the first part of this series on Internet Law.]


September 27, 2012  11:20 AM

Internet Law: Contracts and Privacy – A Generation’s Development



Posted by: David Scott
Internet Law, Terms of Use

[Note:  These are my present...


September 25, 2012  1:59 PM

94 MILLION Personal Files Exposed: Sobering Statistics Regarding Data Breach



Posted by: David Scott
data breach

According to security firm


September 24, 2012  10:56 AM

Part II: When IT and Business Collaborate, Selling (and buying) is Key



Posted by: David Scott
1 year plan

[If you haven't read Part I, please see that post...


September 20, 2012  10:57 AM

When IT and Business Collaborate, Selling (and buying) is Key



Posted by: David Scott
1 year plan

I often hear complaints from various business teams, IT...


September 2, 2012  8:47 AM

Losing Productivity? Points of diminishing return…



Posted by: David Scott
acceptable use policy, e-mail, e-mail administration, e-mail management, e-mail policy, security policies, social media

There’s seemingly no limit on time-wasting...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: