I get it. I really do. The old saying of “You can lead a horse to water, but you can’t make him drink,” seems to be one of the most frustrating truths in security. I remember on one particular, highlight politicized, multi-vendor public sector project I was on, it was enough to literally make me […]
Nobody cares you don’t have a “real” security architecture
If you’re reading this email, I’m pretty sure I don’t have to tell you about the merits of business-driven security architectures. And, even if, for some reason, you’re not entirely convinced that there’s more to “security architecture” than infrastructure diagrams, that’s not what I’m here to talk to you about today. Today, we’re going to […]
3 Security Architects
As you might recall, my 2 year old likes to sing. In fact, she sings literally hours every day. When we’re on the way to school, she sings. When she’s taking a bath, she sings. And since we got her and her brother a kiddie karaoke cube for Christmas, she wants to sing pretty much […]
The honest security architect
The agenda for today was actually pretty straightforward. My mother’s still visiting for the holidays for a bit longer, and things have been a bit hectic, so we haven’t really managed to do all that much “touristy” stuff this time around. So the plan was to let her visit a couple of wineries, then have […]
Don’t read this post unless you’re funding your own security skill development
I’ll keep this short and to the point. As you probably know, I’ve been harping on about the next run of our Building Effective Security Architectures course for a few weeks now, and as of today, we’re exactly 1 month from when everyone who’s already joined the program will have access to the first week’s […]
- « Previous Page
- 1
- …
- 22
- 23
- 24
- 25
- 26
- …
- 57
- Next Page »