This weekend, as you do after 5 weeks of the whole family under one roof, my wife decided that it was time to clean out the garage. And, apart from needing to do a bit of real-world architecture archaeology on my son’s disassembled Hot Wheels garage to get it back together correctly, things generally went […]
Are you wrapped around the axle of security?
I have to admit that “wrapped around the axle” was a phrase I hadn’t heard until almost two years ago, but since then, I’ve found it a pretty good metaphor to describe what can happen if we get lost in the turbulent waters of our own, overly-emotional thinking. Now, if you’re new – and a few […]
How to turn 53,426 words of security policy into usable security architecture
Here’s an interesting question for you to think about: What’s the relationship between security policy and security architecture in your organization? I mean, how related and/or connected do you think they are? True story: In one of the organizations I work with, they actually had a fairly good structure and scope to their information security […]
How’s your hope/commitment ratio looking today?
I swear in the last 5 days, I must’ve seen either direct or indirect references to the Stockdale Paradox that I spoke to you about some 15 days ago more than a dozen times. So, I figured it’d be worth saying something about it once more since the general sentiment seems to be on people’s […]
When your security architecture gets sucker-punched
Yesterday, I mentioned going through all those reference architects and architecture examples. And another thing I found was something else I really don’t like: The assumption that control library deployments is all the “security architecture” you really need. Obviously, if you’ve been around for long enough, you know this is true. Control libraries are…well, they’re […]
- « Previous Page
- 1
- …
- 7
- 8
- 9
- 10
- 11
- …
- 56
- Next Page »