You might remember that my mother has been visiting us since just before Christmas, and you might also remember that I’m from the US, so…that’s where she lives. Not only that, it’s where she banks and where she has her mobile phone service (unsurprisingly). Given the almost daily deafening stampede of credit card details we […]
Let there be Security Architecture!
Without a doubt, one of the biggest stumbling blocks for people attempting to create security architectures that align with the business, veritably scream the value they create and which underpin and drive the entirety of an effective security program that enables and protects the organization… Is getting started. Whatever your thoughts on religion might be, […]
Are you my kind of “security architect”?
Two conversations I’ve had in the last 5 days have prompted me to put more than a little thought into what my definition of a “security architect” actually is—especially given the nature of what Archistry does through our coaching, mentoring and training programs. The proliferation of definitions of “security architect” I talked about in the […]
I said…read the damn policy—or the puppy dies
I get it. I really do. The old saying of “You can lead a horse to water, but you can’t make him drink,” seems to be one of the most frustrating truths in security. I remember on one particular, highlight politicized, multi-vendor public sector project I was on, it was enough to literally make me […]
Nobody cares you don’t have a “real” security architecture
If you’re reading this email, I’m pretty sure I don’t have to tell you about the merits of business-driven security architectures. And, even if, for some reason, you’re not entirely convinced that there’s more to “security architecture” than infrastructure diagrams, that’s not what I’m here to talk to you about today. Today, we’re going to […]
- « Previous Page
- 1
- …
- 16
- 17
- 18
- 19
- 20
- …
- 41
- Next Page »