The Business-Technology Weave:

February, 2013


February 28, 2013  4:26 PM

DAPR is Never Finished: Policy and Planning



Posted by: David Scott
disaster awareness, disaster awareness preparedness and recovery, disaster plan, disaster prevention, disaster recovery plan

Security must...

February 28, 2013  8:47 AM

Disaster Awareness, Preparedness, and Recovery (DAPR) Fundamentals



Posted by: David Scott
disaster awareness, disaster awareness preparedness and recovery, disaster prevention, disaster recovery plan

In continuing from days prior,...


February 27, 2013  12:17 PM

DR vs. DAPR – Cont.



Posted by: David Scott
disaster awareness, disaster awareness preparedness and recovery, disaster plan, disaster planning, disaster prevention, disaster recovery plan

In


February 26, 2013  1:20 PM

DISASTER RECOVERY (DR) vs. DISASTER AWARENESS, PREPAREDNESS, AND RECOVERY (DAPR)



Posted by: David Scott
business agility, business continuity, disaster awareness, disaster awareness preparedness and recovery, disaster plan, disaster prevention, disaster recovery plan

Organizations, vendors,...


February 25, 2013  11:50 AM

Cyber Awareness: Personal Security



Posted by: David Scott
cyber attack, cyber awareness, cyber crime, cyber espionage, cyber security, cyber threat, cyber training, cybercrime, cybersecurity, cyberspying, cyberwar

People have...


February 21, 2013  9:10 AM

Author Karen Spencer – “A to XP: The Agile ABC Book”



Posted by: David Scott
business adaptability, business agility, business and IT change, business and IT planning, business continuity

  Bookmark and Share     1 Comment     RSS Feed     Email a friend


February 20, 2013  1:14 PM

Cyber Awareness Going Mainstream



Posted by: David Scott
cyber attack, cyber awareness, cyber espionage, cyber security, cyber threat, cyber war, cyberwar, hack, hacktivism

I don’t mean “mainstream” in the...


February 19, 2013  10:33 AM

Cyberwar Between Business Competitors – This blog’s prediction come true?



Posted by: David Scott
cyber attack, cyber awareness, cyber crime, cyber espionage, cyber security, cyber war, cybercrime, cybersecurity, cyberwar, cyberwarfare

It’s just been reported that Burger...


February 17, 2013  3:17 PM

Business Protections: New thinking for new realities



Posted by: David Scott
cyber attack, cyber crime, cyber espionage, cyber security, cyber terror, cyber threat, cybersecurity

In the next 2 to 10 years, the...


February 12, 2013  10:35 AM

Cybersecurity – The local impact… inside and out



Posted by: David Scott
computer virus, computer vulnerabilities, computer vulnerability, computer war, cyber attack, cyber awareness, cyber crime, cyber espionage, cyber monday, cyber security, cyber security and government, cyber shopping, cyber terror, cyber terrorism, cyber threat, cyber training, cyber war, cyber warfare, cyber-cop, cyber-spying, cybercop, cybercrime, cybersecurity, cyberspying, cyberterror, cyberwar, cyberwarfare, malicious code, malware

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: