May 26, 2020 Maybe it’s not every time you get some kind of project solution architecture in your inbox, but most of the time, there’s bound to be at least one stick figure in the picture. Maybe it’s labeled “customer”, maybe it’s “user”, maybe it’s even something a bit more racy…like “administrator”. But, it’s […]
Some stick figures, a cloud, a cylinder and a brick wall
May 24, 2020 “Whaddya mean, ‘That’s not architecture’? What else could you possibly need to know, Mr. Smarty-pants Security Architect?” If not the words, we’ve probably all seen the diagrams. Often PowerPoint, sometimes Visio, and only very rarely created in some kind of formalized automation tools, in some organizations, this is, literally, the state […]
Would you like fries with that?
May 22, 2020 Today on a call, I heard a story I’ve heard many times before. And the issue crystalizes the difference between security being seen as an order-taker vs. a trusted partner. What they’re trying to do is define a specific strategy associated with a very high-profile problem within their organization. However, I just […]
The correct response to “we don’t have time for security”
May 21, 2020 On a call today, I was reminded of one of the recent challenges facing security architects – or even security leaders (BISOs and CISOs) – who understand the value of architecture and know that it has an essential place in software development—no matter what approach you’re using. This challenge is most often […]
When your cherry picker gets stuck in the tree
May 20, 2020 Far too many people approach security architecture like Fred Flintstone—that is, if they worry about proper security architecture at all. Mind you, I’m not talking about this here new-fangled, live-action fiddle-dee-dee that most people might think of. I’m talking about the one I grew up with, in the real caveman days. The […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 60
- Next Page »