The Business-Technology Weave:

WikiLeaks

1

January 10, 2011  2:16 PM

Wikileaks Redux: Gov’t. strategy doc on preventing leaks… is leaked



Posted by: David Scott
acceptable use, business security, content management, data breach, data security, IT security, Security Plan, security policy, WikiLeaks

 

I can’t ignore this story. ...

December 10, 2010  11:18 AM

Wikileaks, Data Breach, and Information Warfare



Posted by: David Scott
content management, data breach, data breaching, data management, hacking, hacktivist, State Department, WikiLeaks

 

The Wikileaks mess remains front and center in the news and it only gets worse. 


December 1, 2010  2:03 PM

Content Management and Acceptable Use Policies



Posted by: David Scott
acceptable use, business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, information dump, information leak, information theft, project control, project management, WikiLeaks

 


November 30, 2010  11:14 AM

Content Continued: Minimizing exposure and liability



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

[Note:  If you haven’t yet, you may wish to start with “


November 30, 2010  10:16 AM

Content, Use and Control



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

In view of the recent WikiLeaks leak (


November 29, 2010  10:13 AM

Content: Getting it; Using it; Re-using it; and Getting Rid of It (Protection, too!)



Posted by: David Scott
business agility, business and IT policy, business and IT change, business and IT planning, business practice, business systems, content, content management, content management system, data management, data protection, leveraging data, WikiLeaks

 

I’ve struck a nerve in...


November 29, 2010  9:44 AM

WikiLeaks: Lessons of Content and Its Management for the Organization



Posted by: David Scott
content, content management, data, data access, data backup, data breach, data theft, national security, state department cables, U.S. security, WikiLeaks

 

Security and data breaches are overwhelmingly due to human...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: