When a person is accused of a crime, evidence is required to back up the accusation. To protect the person being accused, physical evidence obtained must be protected from anyone who might want to tamper with it in order to …Read more
“Alexa! Where are my keys?”
I am looking forward to a day when I do not have to ask anyone to help me find my keys. I am convinced that in the very near future, I will have that technology …Read more
Several years ago, I worked with a large organization that wanted to re-evaluate their cell phone policies. They wanted to see if they could re-allocate some of their cell phone budget to another project. To accomplish this, they created four …Read more
If you were to build a fence around your house to keep out the wild animals, it would not make sense to leave a portion of that fence incomplete. In fact, any gap in your fence would invalidate the purpose …Read more
Many years ago, I worked as an IT support analyst helping companies with a software product that managed their documents on the network.
When customers called for help, I used a software program to open an incident that described the …Read more
Prior to installing a home security system, a discovery process must take place to evaluate all vulnerabilities around the property. No matter how good a home security system is, it is worthless if you do not secure every window and …Read more
I have heard many stories about the pain and affliction software auditors have caused many organizations; however, I had not yet met an auditor—until now, this was to be my first time meeting with a software auditor in person.
We …Read more