…that needs to be taken behind the shed and shot D-E-D. Dead! And then cut up into 100 pieces and buried deep in the ground, much like the the Blood Queen Nimue in the latest Hellboy—lest it comes back to lay waste to the entire planet… …or at least to the organization you’re trying to […]
The two critical characteristics of security architecture
The way I see it, the ultimate litmus test for whether your security architecture is up to the job boils down to the answers to these two questions: Does it enable the right decisions to be made by the right people to keep the organization safe? Does it document the existing decisions in sufficient detail […]
And the architect came back, the very next day…
…or did they? Where we live in Cape Town, we’re surrounded by houses. And, somewhere in this maze of walled dwellings live no less than 3 cats. There’s two black ones, and there’s one that’s kinda grey/brown. All of them think our yard is the best place in the world to play, hunt…and, not so […]
Stepping in mythical maturity mud puddles
While this is something I’ve written about before, it’s not normally something that comes up quite so strongly and quite so often in the same day. That “something” is the myth of some magical level of maturity in your security program when “things will happen.” When we get [magical maturity level], then we can be […]
Avoiding the training course hangover
Training courses have lots of good things going for them, but one of the bad things that can happen – especially in live, in-person training courses – is that there’s so much material to cover in the 3 or 5 days of sessions, you’re almost always bound to hit that point exemplified by the classic […]
- « Previous Page
- 1
- …
- 29
- 30
- 31
- 32
- 33
- …
- 60
- Next Page »