No, I don’t mean everyone on the team gets a side-hustle and funnels the proceeds to prop up the security budget—but, in some cases, I suppose truth has been known to be stranger than fiction. I mentioned this in passing the other day, but regardless of whether the economy springs immediately into shape (which ain’t […]
How to avoid bad things happening
This weekend, as you do after 5 weeks of the whole family under one roof, my wife decided that it was time to clean out the garage. And, apart from needing to do a bit of real-world architecture archaeology on my son’s disassembled Hot Wheels garage to get it back together correctly, things generally went […]
Are you wrapped around the axle of security?
I have to admit that “wrapped around the axle” was a phrase I hadn’t heard until almost two years ago, but since then, I’ve found it a pretty good metaphor to describe what can happen if we get lost in the turbulent waters of our own, overly-emotional thinking. Now, if you’re new – and a few […]
How to turn 53,426 words of security policy into usable security architecture
Here’s an interesting question for you to think about: What’s the relationship between security policy and security architecture in your organization? I mean, how related and/or connected do you think they are? True story: In one of the organizations I work with, they actually had a fairly good structure and scope to their information security […]
How’s your hope/commitment ratio looking today?
I swear in the last 5 days, I must’ve seen either direct or indirect references to the Stockdale Paradox that I spoke to you about some 15 days ago more than a dozen times. So, I figured it’d be worth saying something about it once more since the general sentiment seems to be on people’s […]
- « Previous Page
- 1
- …
- 8
- 9
- 10
- 11
- 12
- …
- 60
- Next Page »