Today’s been a bit hectic for me, so I’m going keep this one short. It’s inspired by a conversation I just had with someone we’ve worked with previously who reminded me that of all the stuff I’ve talked about so far, one of the the…well, many things I haven’t yet talked about that you’ll learn […]
Busting the Zero-Trust drug dealers
This “zero trust” thing is really starting to get out of hand. It’s clearly the newest security drug everyone seems to be pimping on every street corner—from vendors to advisors to the media. “Pssst….hey buddy. I know they say you can’t buy it, but…wanna fix?” The reason it’s so important to get these low-class dealers […]
The mad magic of middle-out architecture
You might remember me talking about the 3 different kinds of security architecture you’re really going to need to build – or, more correctly, discover – as part of the process I call architecture archaeology. Two of them are probably pretty-familiar to you, because we tend to use them all the time as either excuses […]
Confessions of a process virgin
I’ll never forget a question that stopped me dead in my tracks early on in my days teaching the official SABSA Foundation course: “But, how are we supposed to figure out what the organization does?” a budding enterprise security architect piped up when we were going through the details of the How column. And it […]
Bite-sized agile security
Turning theory into practice is always tricky—especially when it’s your first time. And with security architecture, the biggest problems you have aren’t really about security architecture at all. They’re about dealing with all the other problems that you have to suddenly stop ignoring if you’re going to change the way security is actually delivered. Because […]
- « Previous Page
- 1
- …
- 17
- 18
- 19
- 20
- 21
- …
- 56
- Next Page »