Posts by Scott Alldridge
Is Change Management A Critical Factor In Trusted Computing?
I would propose this working thesis; no security breach happens without a change or a need for a change! Do you unequivocally know what has changed in your IT Footprint? Let’s start here think about your holistic IT environment starting from the physical aspects all the way to your applications and most importantly your data.…
Read MoreNext Generation Security
Cybersecurity breaches seem to occupy too many headlines these days. There seems to be so many attention-grabbing examples of how inadequate information, applications, and IT security can impact our businesses. There is documented evidence that security breaches can affect brand, marketplace trust, customer privacy and identity, not to mention the bottom line. The proliferation of…
Read More