I’ve been looking at a lot of “security architecture” recently, including some live, organizational architectures, some “off the cuff” things that I’d call security architecture “sketches”, and some formalized, published reference architecture models. And it hit me when I was taking a break, sitting in the fleeting sunshine this afternoon and listening to some Jimi […]
Why “security” may only be doing part of the job
One of the biggest problems in security that comes up over and over again is trying to demonstrate the value of what we do. After all, to the majority of the people, we’re just a cost center. As the old saying goes, they’re giving us money… …so that nothing bad happens. As I’ve alluded to […]
Your mission: save the world
Grandiose? Maybe…but hey, I’m in that kind of mood right now, because my son decided tonight was the night he wanted to watch Justice League. Fortunately, he feel asleep before the really, really scary parts at the end—well, scary for a 5 year-old…but not too scary that he didn’t want to watch it. Now, I […]
What if information didn’t flow?
About 15 or 16 years ago, I was neck-deep in SOA, federated identity and defining my own framework of IEE1471:2000 views and viewpoints that I believed were the most relevant for enterprise (business) architecture, enterprise (technology) architecture and enterprise security architecture. Obviously, I was taking my first baby-steps with SABSA for the last one, but […]
Taming the security architecture beast
I was having a very interesting conversation today with a Security Architect who has done all of the SABSA training, and one of the things he mentioned was how overwhelming it all seemed. In fact, his position was that, because it was so big, it wasn’t really practical to use the whole thing—unless you were […]
- « Previous Page
- 1
- …
- 8
- 9
- 10
- 11
- 12
- …
- 56
- Next Page »