Without a doubt, one of the biggest stumbling blocks for people attempting to create security architectures that align with the business, veritably scream the value they create and which underpin and drive the entirety of an effective security program that enables and protects the organization… Is getting started. Whatever your thoughts on religion might be, […]
Are you my kind of “security architect”?
Two conversations I’ve had in the last 5 days have prompted me to put more than a little thought into what my definition of a “security architect” actually is—especially given the nature of what Archistry does through our coaching, mentoring and training programs. The proliferation of definitions of “security architect” I talked about in the […]
I said…read the damn policy—or the puppy dies
I get it. I really do. The old saying of “You can lead a horse to water, but you can’t make him drink,” seems to be one of the most frustrating truths in security. I remember on one particular, highlight politicized, multi-vendor public sector project I was on, it was enough to literally make me […]
Nobody cares you don’t have a “real” security architecture
If you’re reading this email, I’m pretty sure I don’t have to tell you about the merits of business-driven security architectures. And, even if, for some reason, you’re not entirely convinced that there’s more to “security architecture” than infrastructure diagrams, that’s not what I’m here to talk to you about today. Today, we’re going to […]
3 Security Architects
As you might recall, my 2 year old likes to sing. In fact, she sings literally hours every day. When we’re on the way to school, she sings. When she’s taking a bath, she sings. And since we got her and her brother a kiddie karaoke cube for Christmas, she wants to sing pretty much […]
- « Previous Page
- 1
- …
- 22
- 23
- 24
- 25
- 26
- …
- 60
- Next Page »