One of the subtler challenges of security is actually knowing the scope of your job. And it’s made trickier by this “cyber” hype disease we’ve collectively caught as an industry over the last few years. I think it’s actually sort of a function of the crisis of definition over the roles in a security program […]
Get more security by talking about it less
As you probably know, there’s no context-free definition of security (and if you didn’t, let this be a wake-up call for you). And one of the key things I talked about in last month’s issue of the newsletter is that the ultimate mission and purpose of security isn’t about you. I know…shocker, right? But yet, […]
Unlocking the “Mega Powers” of stakeholder interviewing
When I was in High School, there wasn’t Netflix, or Amazon Prime or even Cable TV the 5 miles outside of the nearest town in East-Central Illinois where I grew up. And this was the late ‘80s, so the options were limited to the 5 broadcast options we had: ABC, NBC, CBS, PBS and one […]
Whaddya mean, “You don’t know what you want??!!”
One of the biggest complaints I hear over and over again about talking to stakeholders as part of a requirements gathering exercise is: “They’re just lazy! They won’t just tell us what they want!” Which is… ridiculous. Now, if it’s around lunchtime, and your belly is grumbling and the smell wafting through the open window […]
That time Ken Thompson made me coffee
I got my Computer Science degree from what was then called the University of Missouri-Rolla a long time ago. Now it’s called the Missouri University of Science and Technology for reasons I don’t remember other than it’s more correct and obvious since Rolla is a tiny, tiny little town in the middle of the state […]
- « Previous Page
- 1
- …
- 43
- 44
- 45
- 46
- 47
- …
- 57
- Next Page »