The Business-Technology Weave:

data access


April 13, 2013  12:00 PM

BIG DATA – Are You Leveraging Data to Modern Standards?



Posted by: David Scott
data access, data accessibility, data as a service, data integrity, data storage

BIG DATABIG DATA is becoming...

May 12, 2011  11:13 AM

Access, Access, Access



Posted by: David Scott
content access, content security, data access, data security, employee access, employee security, information access, information security, security training, small and medium business, small-to-medium business, smartphones and business, SMB

 

Hey, if ya can’t access it, what good is it?  Well,...


April 9, 2011  11:36 AM

In The Cloud, and… In-Accessible?



Posted by: David Scott
centralized data, cloud, cloud applications, cloud apps, cloud reliability, cloud security, data, data access, data accessibility, data backup, data breach, data breach expense, data compromise, data control, data integrity, data loss, data loss prevention, data management, data security, offsite backup, offsite data, the cloud

 

I was doing a bit of reading regarding Amazon’s new Amazon Cloud...


March 28, 2011  3:04 PM

Large security vendor suffers breach



Posted by: David Scott
access security, best business practice, best security practice, breach notification, business security plan, computer security, content security, cost of data breach, cyber security, cybersecurity, data access, data backup, data breach, data compromise, data integrity, data liability, data loss prevention, data security, device security, employee security, employer security, enterprise security, government security, info security, IT security, securing data

 

It’s been reported that RSA Security has...


March 26, 2011  2:56 PM

Data and Online Security Involve More than Content



Posted by: David Scott
alexandra wallace, Asian students, content awareness, content liability, content propagation, content security, data access, data breach, data breach expense, data propagation, data security, information leak, information management, information propagation, information security, information technology security, internet security, IT and social networking, kids and social networking, online security, social media, social media peril, social media security, social network, social network policy, social networking, UCLA library, web propagation, youtube

 

Security involves so much more than physical protection and...


December 30, 2010  10:23 AM

Have a safe, and happy, new year – Happy New Year!



Posted by: David Scott
content access, content control, content management, data access, data control, end-point devices, endpoint devices, IT security, VDI, virtual desktop interface

 

I was reviewing the accelerating change I’ve witnessed this year for both...


December 1, 2010  2:03 PM

Content Management and Acceptable Use Policies



Posted by: David Scott
acceptable use, business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, information dump, information leak, information theft, project control, project management, WikiLeaks

 


November 30, 2010  11:14 AM

Content Continued: Minimizing exposure and liability



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

[Note:  If you haven’t yet, you may wish to start with “


November 30, 2010  10:16 AM

Content, Use and Control



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

In view of the recent WikiLeaks leak (


November 29, 2010  9:44 AM

WikiLeaks: Lessons of Content and Its Management for the Organization



Posted by: David Scott
content, content management, data, data access, data backup, data breach, data theft, national security, state department cables, U.S. security, WikiLeaks

 

Security and data breaches are overwhelmingly due to human...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: