The Business-Technology Weave:

content security


April 29, 2011  12:04 PM

Ahhh, New York City you talk a lot; let’s have a look at ya…



Posted by: David Scott
access security, best security practice, business breach, business security plan, computer security, content management, content security, cost of data breach, cyber security, data breach, data disclosure, data exposure, data security, enterprise security, human error, New York Yankees, New York Yankees data breach, NY Yankees, NY Yankees data breach, security breach

 

(With apologies to Mick Jagger/Rolling Stones -  NYC,...

March 28, 2011  3:04 PM

Large security vendor suffers breach



Posted by: David Scott
access security, best business practice, best security practice, breach notification, business security plan, computer security, content security, cost of data breach, cyber security, cybersecurity, data access, data backup, data breach, data compromise, data integrity, data liability, data loss prevention, data security, device security, employee security, employer security, enterprise security, government security, info security, IT security, securing data

 

It’s been reported that RSA Security has...


March 26, 2011  2:56 PM

Data and Online Security Involve More than Content



Posted by: David Scott
alexandra wallace, Asian students, content awareness, content liability, content propagation, content security, data access, data breach, data breach expense, data propagation, data security, information leak, information management, information propagation, information security, information technology security, internet security, IT and social networking, kids and social networking, online security, social media, social media peril, social media security, social network, social network policy, social networking, UCLA library, web propagation, youtube

 

Security involves so much more than physical protection and...


December 29, 2010  10:27 AM

Passwords: It’s the season for sharing, but…



Posted by: David Scott
computer password, content security, data breach, data security, data theft, e-mail breach, e-mail password, ID theft, information security, password

 

You may have heard about the man being...


December 28, 2010  11:55 AM

You don’t know what you don’t know



Posted by: David Scott
business plans and policy, business security, content management, content security, data security, enterprise resource management, enterprise resource planning, enterprise security, information systems, intellectual property, intellectual property security, IT security, MIS, security policyi and plans

 

When securing information, intellectual property, data (hard and soft, paper...


October 27, 2010  12:59 PM

A Model for Tearing the Weave: Starbucks, Safety and Security, Pt. III



Posted by: David Scott
business security, content management, content security, data security, IT security, Starbucks

 

(Please see Parts I and II, below)


September 8, 2010  5:58 AM

“Open” Data / Resource Environments



Posted by: David Scott
acceptable use, business security, business standards, computer lab, content management, content security, IT security, IT standards, open data

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 23, 2010  11:57 AM

Security and Insecurity: Finite vs. Infinite – Pt. II



Posted by: David Scott
business security, content management, content security, data management, data security, data theft, information security, IT plans, IT policy, IT security, Security Plan, security policy

 

In battling...


March 24, 2010  9:03 AM

Data Security and Transport – How Do You and Your Organization Operate?



Posted by: David Scott
business security, content, content management, content security, data security, data transport, portability

 

An interesting thing came to my attention last week when I was using a thumb drive to transport files back and forth between secure...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: