The Business-Technology Weave:

data control

1

April 28, 2011  7:44 AM

Security, Sony, and Station (PlayStation), Part 45



Posted by: David Scott
authentication, authentication questions, cost of data breach, credential information, credentialing information, credit card breach, credit card data, data breach, data breach expense, data compromise, data control, ID, login, password, playstation, Sony, Sony PlayStation, user data, user ID

 

Just kidding – it’s only Part 2.  (Please see first...

April 9, 2011  11:36 AM

In The Cloud, and… In-Accessible?



Posted by: David Scott
centralized data, cloud, cloud applications, cloud apps, cloud reliability, cloud security, data, data access, data accessibility, data backup, data breach, data breach expense, data compromise, data control, data integrity, data loss, data loss prevention, data management, data security, offsite backup, offsite data, the cloud

 

I was doing a bit of reading regarding Amazon’s new Amazon Cloud...


December 30, 2010  10:23 AM

Have a safe, and happy, new year – Happy New Year!



Posted by: David Scott
content access, content control, content management, data access, data control, end-point devices, endpoint devices, IT security, VDI, virtual desktop interface

 

I was reviewing the accelerating change I’ve witnessed this year for both...


December 1, 2010  2:03 PM

Content Management and Acceptable Use Policies



Posted by: David Scott
acceptable use, business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, information dump, information leak, information theft, project control, project management, WikiLeaks

 


November 30, 2010  11:14 AM

Content Continued: Minimizing exposure and liability



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

[Note:  If you haven’t yet, you may wish to start with “


November 30, 2010  10:16 AM

Content, Use and Control



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

In view of the recent WikiLeaks leak (


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: