December 21, 2012  12:24 PM

Modern Security Awareness

Posted by: David Scott
business alignment, business and IT policy, business and IT planning, business continuity, ID theft, identity breach, identity management, identity theft

A national...

November 11, 2012  9:45 AM

Identity Theft: Job search perils

Posted by: David Scott
data breaching, data theft, ID theft, identity theft

As identity theft grows in terms of volume,...

December 5, 2011  8:26 AM

PC Magazine’s “The 25 Worst Passwords of 2011”

Posted by: David Scott
authentication, computer password, content security, data breach, data security, data theft, identity theft, online credentials, online security, password security, user ID, worst passwords, worst passwords of 2011


October 10, 2011  5:19 PM

Security Vulnerabilities Leach Further and Further “Inside”

Posted by: David Scott
ID theft ring in New York, ID theft ring in NYC, identity theft, insider threat, restaurant workers stealing credit card info

Bookmark and Share     0 Comments     RSS Feed     Email a friend

May 23, 2011  11:58 AM

LinkedIn: Linking to Insecurity?

Posted by: David Scott
cookies, cookies expiration, hacking, identity theft, linkedin, LinkedIn security, LinkedIn security flaw, security flaw LinkedIn


There is a potential problem at LinkedIn – a social networking site...

April 18, 2011  11:30 AM

Uh Oh: Government Sponsored Internet ID Plan?

Posted by: David Scott
cyber security, federal government breach, government breach, identity ecosystem, identity theft, internet ID, National Strategy for Trusted Identities in Cyberspace, online security


No partisan ruminations here:  We IT and Business folk are...

July 21, 2010  6:00 AM

Data Breach and Legislation: What’s Coming Your Way?

Posted by: David Scott
breach notification, business legislation, business security, content management, data breach, data breach law, data legislation, disaster recovery, identity theft, it legislation, IT security, security breach, security policy, UK data breach laws, US data breach laws


It’s rather interesting to monitor what’s happening in the UK right now. ...

May 13, 2010  6:13 AM

You Say “Business Security,” I Say “IT Security”…

Posted by: David Scott
business management, business security, data breach, data privacy, identity breach, identity theft, IT security, IT Wars, organizational security, the business-technology weave


You say To-MAY-to, I say To-MAH-to…  one thing’s for certain:  When it comes to organizational security we...

March 4, 2010  7:11 AM

Data Breaches and the Business-Technology Weave (BTW)

Posted by: David Scott
content management, data breach, data security, data theft, identity theft, IT security

Everyone in the organization needs to be a mini-Security Officer these days. What does that mean? It’s time for each person to recognize that every action must be viewed through the prism of security, and activity must be conducted in accordance with...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: