May 17, 2020 Email Did you know that the top two investment drivers for cybersecurity right now are still regulatory compliance and reducing incidents and breaches? Maybe you did. And, it shouldn’t really be too surprising, I guess. I mean, far too much of the work we do as security professionals is still way too […]
But I’m never going to use it
Said lots of people, possibly with a lot of certifications after their name—or at least a drawer full of “Certificates of Completion” from various courses and programs. Back when I was talking about the 7 Deadly Sins of Security Architecture for the March issue of the Security Sanity™ print newsletter, one of the sins was […]
The real difference between architecture and engineering
I know it probably shouldn’t, but it still blows me away how many people don’t really get the difference between engineering and architecture—especially in security. A good while ago now, I happened on an infosec conversation in the twitterverse talking about the composition of the ideal security team. And, of course, there were SOC people, […]
The myth of the isolated project
I was recently reminded of a pretty pervasive problem that often sneaks in to our worlds as security. That problem is the myth of the isolated project. It often starts simply enough (and if you have kids, you should recognize these warning signs): “It’s just this one time. I won’t ask you to do this […]
The boneyard of failed architecture initiatives
One thing that often happens when people finally discover that security architecture is a whole more than the way their security infrastructure is connected is that they’re all “hot to trot” and want to stand up an enterprise security architecture program from scratch. This is excellent, and one should never underestimate the power of enthusiasm. […]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 58
- Next Page »