Polices. Everybody has them, and whether they’re good or bad is actually irrelevant. Because if you want to practice real security architecture in your organization, you’re going to have to eventually bite the bullet and do something with them. If you want to keep them, you have to be able to prove they actually support […]
Remember who built the spacecraft that put men on the moon?
Nope? Well, neither do I, actually. But we all remember that in 1969 the United States put the first men on the moon. The name of the company was actually two different ones: the command module was built by North American Aviation of P-51, B-25 and F-86 fame, and the lunar module was built by […]
Winning your own architecture wars
I want to tell you a little story about this guy – he was a bit geeky, loved comic books and sci-fi – and he had this crazy idea that was basically *guaranteed* to fail—at least as far as most people were concerned, anyway. But this geeky, highly introverted guy…he just wouldn’t give up, and, […]
TOGAF-crossed domains
Given that in most of the world (except Brazil) it’s Valentine’s Day weekend, I thought it would be a good time to tell a little love story of Romeo and Juliet proportions. Of course, the love story I’m talking about is the story of SABSA and TOGAF. Now SABSA is a bit of a recluse, […]
Don’t fear the framework
One thing we can pretty-much count on is that wherever we may find ourselves trying to do security architecture is going to have some kind of framework they’re using for delivering security. And one of the most popular ones of these frameworks is… …you guessed it—the NIST Cybersecurity Framework. Now, the whole “it’s just an […]
- « Previous Page
- 1
- …
- 18
- 19
- 20
- 21
- 22
- …
- 56
- Next Page »