This morning I was listening to a talk by Ken McCarthy, and he said something that I knew, but that I really hadn’t thought about for a while. Now you might not know who Ken McCarthy is, because he has absolutely nothing to do with security. He’s a marketing guy. But if you’ve been playing […]
Lost in the architecture wasteland
Yesterday I had a brilliant (and, fortunately, public) reminder of how often the life of a security architect is effectively lost in a wasteland of “architecture” that people genuinely believe is a useful depiction of the state of the world—or an organization. This time, the example was provided on Twitter with a brief “IT architect […]
The 3 little security programs
Whether we consciously recognize it or not, the stories we grow up with tend to influence our thinking more than we might realize. And that’s a good thing, and in fact, it’s probably one of the reasons humans have lived as long as they have without all being eaten by prehistoric critters. It’s one pretty […]
Rush, rabbits and reality
Since my last email was a bit of musically-inspired guidance on what not to do as a security architect, I thought I’d continue the theme today with probably the best, most direct – and most effective – advice I’ve ever heard about the practice of architecture from a band called Rush. The lead track of […]
Is there a little too much Johnny Cash in your framework?
You might’ve heard me talk about this a bit in the past, but I grew up in East-Central Illinois on a farm in the ‘70s and ‘80s. And one of the things I grew up listening to on the radio – until I had one of my own – was Country & Western music. I […]
- « Previous Page
- 1
- …
- 20
- 21
- 22
- 23
- 24
- …
- 57
- Next Page »