The Business-Technology Weave:

security plans

1

June 26, 2013  11:57 AM

NSA, Surrveillance, and New Parameters for Business Liability Coverage



Posted by: David Scott
acceptable use policy, acceptable use training, securing data, security plans, security policies and plans

docThe National Security...

January 30, 2013  12:47 PM

The Multiplicity of “End Points” for Sensitive Information



Posted by: David Scott
secure transmission of data, securing data, security plans, security policies, security practices, securtiy policy

Symantec is aggressively...


July 18, 2011  12:50 PM

European Union Considering Breach Notifications Rules



Posted by: David Scott
breach notification, breach notification law, breach notification rules, content management, content management policy, data breach, data integrity, data security, government breach, government data breach, IT security, security plans, security policy

 

It’s interesting to me that the European Union’s European Commission is...


August 25, 2010  1:08 PM

Security and Insecurity: Finite vs. Infinite – Pt. III



Posted by: David Scott
business security, content management, data breach, data security, data theft, IT plans, IT security, security plans, security policy

Awareness, Action and…...


August 21, 2010  10:35 AM

A New Security Wrinkle



Posted by: David Scott
authenticating questions, authentication, authentication questions, bank security, data breach, data security, data theft, financial security, ID theft, info security, information security, security plans, security policies, security policy, security question, security questions

 

Something interesting happened to me the other day.  There was an...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: