Is Change Management A Critical Factor In Trusted Computing?

I would propose this working thesis; no security breach happens without a change or a need for a change! Do you unequivocally know what has changed in your IT Footprint? Let’s start here think about your holistic IT environment starting from the physical aspects all the way to your applications and most importantly your data.…

Read More

Next Generation Security

Cybersecurity breaches seem to occupy too many headlines these days. There seems to be so many attention-grabbing examples of how inadequate information, applications, and IT security can impact our businesses. There is documented evidence that security breaches can affect brand, marketplace trust, customer privacy and identity, not to mention the bottom line. The proliferation of…

Read More

Why your Cybersecurity strategy needs DevOps

A chain is only as strong as its weakest link In the past few years, leaders have accepted that the human error is the biggest security risk to an organization, and organizations have responded with valuable policies and programs such as security awareness training and multi-factor authentication. Necessary, but not sufficient. Organizations must continue implementing more robust security measures, expanding…

Read More

What Do Castles and Internet Security Have in Common?

For the past two decades myself and a handful of others have been preaching the fact that organizations must look at security through a different set of glasses. For too many years we’ve been enamored with the bright shiny objects created by Symantec, IBM, Checkpoint and other technology companies where they want to keep the…

Read More

The Ultimate Backstop for Hospital Cybersecurity

By Bill Siwicki | April 15, 2016  “Healthcare entities that want to be well positioned against cybersecurity threats must know what resources they have, how those are configured, and tightly control any changes,” IT Process Institute chief executive Scott Alldridge said. IT Process Institute CEO Scott Allridge has cybersecurity advice for healthcare executives: Consider ITIL,…

Read More