The Business-Technology Weave:

data breach

May 15, 2010  9:20 AM

Insecurity: A State Agency’s Data “Security” Posture

Posted by: David Scott
acceptable use, business security, content management, data breach, data theft, IT security, IT Wars, security policy, the business-technology weave


I’ve been doing a little work for a big State agency.  By “big,” I mean big budget, large number of...

May 13, 2010  6:13 AM

You Say “Business Security,” I Say “IT Security”…

Posted by: David Scott
business management, business security, data breach, data privacy, identity breach, identity theft, IT security, IT Wars, organizational security, the business-technology weave


You say To-MAY-to, I say To-MAH-to…  one thing’s for certain:  When it comes to organizational security we...

March 4, 2010  7:11 AM

Data Breaches and the Business-Technology Weave (BTW)

Posted by: David Scott
content management, data breach, data security, data theft, identity theft, IT security

Everyone in the organization needs to be a mini-Security Officer these days. What does that mean? It’s time for each person to recognize that every action must be viewed through the prism of security, and activity must be conducted in accordance with...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: