The Business-Technology Weave:

content management


December 7, 2011  10:28 AM

Looming Liability: Non-Work Apps in the Workplace



Posted by: David Scott
business productivity, content management, data security, employee monitoring, employee training, enterprise security, IT productivity, IT training, non-work applications, Non-work apps, small-to-medium business security, SMB security, workplace security

 

December 1, 2011  12:21 PM

Cyber Crime to Invade Public Cloud… and more…



Posted by: David Scott
cloud security, content management, cyber crime, data breach, data security, data theft, Hacker, hacking, hacktivism, hacktivist, IT governance, security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 22, 2011  12:01 PM

Cyber-terror, Hacktivism, etc.: New thoughts on security for the modern organization



Posted by: David Scott
acceptable use, content management, cyber security, cyber terrorism, data breach, data security, data theft, hack, hacking, hacktivism, hacktivists, Illinois water plant, security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 17, 2011  11:26 AM

Security Expert Eugene Kaspersky Warns of Cyber-Terror



Posted by: David Scott
acceptible use, CMS, content management, cyber crime, cyber espionage, cyber terror, cyber terrorism, cyberterror, data breach, data theft, Eugene Kaspersky, hacktivism, ID theft, Kaspersky, security breach, security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 16, 2011  12:45 PM

Help Propagate “The Business-Technology Weave” – and a bonus!



Posted by: David Scott
BTW, CMS, content management, cyber terror, cybersecurity, cyberterror, data security, futilitycloset.com, IT governance, the business-technology weave

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 14, 2011  3:06 PM

Google Says Government Requests for User Data on the Rise



Posted by: David Scott
CMS, content management, content security, data security, google government requests, google report, Google Transparency Report, government request for data, government request for information, government request for user data, government requests for data, user content

 


October 27, 2011  2:44 PM

HP Experience Yields Appreciation of New Areas of Risk, Pt. II: Apple vs. PC



Posted by: David Scott
Apple, apple computers, backup plan, backup plan and policy, backup policy, backup policy and plan, comprehensive backup, content management, content management policy, content security, data recovery, data security, data surety, Hewlett-Packard, HP, HP computer, HP laptop

 


October 26, 2011  2:34 PM

An Experience with HP Yields Appreciation for New Area of Risk



Posted by: David Scott
Apple, apple computers, backup plan, backup plan and policy, backup policy, backup policy and plan, comprehensive backup, content management, content management policy, content security, data recovery, data security, data surety, Hewlett-Packard, HP, HP computer, HP laptop

Bookmark and Share     3 Comments     RSS Feed     Email a friend


October 23, 2011  12:54 PM

Massachusetts and Breach: Yielding a Comprehensive Understanding of Risk



Posted by: David Scott
content management, data breach, data exposure, data loss, data security, data theft, massachusetts breach

According to the Massachusetts...


September 29, 2011  8:20 AM

Cyber Espionage in the Modern Age



Posted by: David Scott
content management, cyber attack, cyber awareness, cyber crime, cyber espionage, cyber security, cyber security and government, cyber threat, cyber war, cyber warfare, cyberwar, cyberwarfare, data and overseas travel, data security, IT security

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: