The Business-Technology Weave:

securing data

1

August 4, 2013  12:34 PM

The Government, Metadata, and You



Posted by: David Scott
metadata, metatag, securing data

A recent article, FBI Pressures Internet Providers to Install Surveillance Software, had me revisiting my thoughts regarding recent government assurances. Various...

June 26, 2013  11:57 AM

NSA, Surrveillance, and New Parameters for Business Liability Coverage



Posted by: David Scott
acceptable use policy, acceptable use training, securing data, security plans, security policies and plans

docThe National Security...


June 9, 2013  12:09 PM

Can You Hear Me Now? Gov’t. Surveillance and ‘Metadata’



Posted by: David Scott
securing data, security officer, security policies, security practices, security prism, securtiy policy, sensitive information

The NSA Campus at Ft. Meade MD_credit

Bookmark and Share     0 Comments     RSS Feed     Email a friend


May 27, 2013  6:03 PM

Wearable Computing: The Personal-Technology Weave, and Beyond…



Posted by: David Scott
personal information, personal information security, phishing, securing data, security practices, sensitive information

First:  Have a quick look at Google Glass.  Wearable computing is going to transform the personal and business realms. 

Bookmark and Share     0 Comments     RSS Feed     Email a friend


January 30, 2013  12:47 PM

The Multiplicity of “End Points” for Sensitive Information



Posted by: David Scott
secure transmission of data, securing data, security plans, security policies, security practices, securtiy policy

Symantec is aggressively...


March 28, 2011  3:04 PM

Large security vendor suffers breach



Posted by: David Scott
access security, best business practice, best security practice, breach notification, business security plan, computer security, content security, cost of data breach, cyber security, cybersecurity, data access, data backup, data breach, data compromise, data integrity, data liability, data loss prevention, data security, device security, employee security, employer security, enterprise security, government security, info security, IT security, securing data

 

It’s been reported that RSA Security has...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: