…and define whether you’re just playing with a security architecture modeling tool or you’re actually building security architectures that can keep your organizations safe and enable them to be successful. Yesterday I talked about the whole “because…” bit of security architecture, and there were a couple of things I didn’t tell you—frankly, because it would’ve […]
Introducing…the “Scratch Our Backside” Framework
There’s one thing you can count on, and that’s wherever security doesn’t consistently do a good job, we’re going to get as close to the problem as we can, and we’re going to spend a lot of time and energy developing some new “industry best practice” in that area, and then we’re going to release […]
Why being an effective security architect is a lot like being an effective parent
And no, I’m not going to go with “because the business acts like children, always trying to tear the walls down.” This was something that actually came to me tonight when I was making a very simple lemon pasta dish (very quick) and my two kids (5 and 2.5) were wanting to bounce their bouncers? […]
A dangerous myth about security architecture
…that needs to be taken behind the shed and shot D-E-D. Dead! And then cut up into 100 pieces and buried deep in the ground, much like the the Blood Queen Nimue in the latest Hellboy—lest it comes back to lay waste to the entire planet… …or at least to the organization you’re trying to […]
The two critical characteristics of security architecture
The way I see it, the ultimate litmus test for whether your security architecture is up to the job boils down to the answers to these two questions: Does it enable the right decisions to be made by the right people to keep the organization safe? Does it document the existing decisions in sufficient detail […]
- « Previous Page
- 1
- …
- 28
- 29
- 30
- 31
- 32
- …
- 57
- Next Page »