May 19, 2020 I had a couple of conversations over the last few of days that I’ve been turning over in my mind, and suddenly, to my surprise, some 1989 L.L. Cool J lyrics popped into my head. And yes, before the question forms on your lips, Walking with a Panther is in my music […]
Breaking through the “domain” barrier with security architecture
May 18, 2020 Let’s get straight to the point: if you approach security with a “domain” mindset, then you’re never actually going to be successful in protecting your organization—nor will you ever, not in a million-billion years, be able to demonstrate you’re actually helping them get things done they want to do. And, those quotes […]
Knowing yourself and your opponent—are you truly ready?
May 17, 2020 Email Did you know that the top two investment drivers for cybersecurity right now are still regulatory compliance and reducing incidents and breaches? Maybe you did. And, it shouldn’t really be too surprising, I guess. I mean, far too much of the work we do as security professionals is still way too […]
But I’m never going to use it
Said lots of people, possibly with a lot of certifications after their name—or at least a drawer full of “Certificates of Completion” from various courses and programs. Back when I was talking about the 7 Deadly Sins of Security Architecture for the March issue of the Security Sanity™ print newsletter, one of the sins was […]
The boneyard of failed architecture initiatives
One thing that often happens when people finally discover that security architecture is a whole more than the way their security infrastructure is connected is that they’re all “hot to trot” and want to stand up an enterprise security architecture program from scratch. This is excellent, and one should never underestimate the power of enthusiasm. […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- 6
- …
- 57
- Next Page »