I have to admit, I was the perfect demographic for the original release of Police Academy in 1984—even though I was too young to go to the cinema to see it by myself. However, I remember thinking it was pretty funny at the time. For some reason, when I was thinking about the problems security […]
Who owns your calendar—really?
One of the things that I’ve heard from people, since I’ve started yammering on about the February cohort of Building Effective Security Architectures in response to the course requirements of 5-10 hours per week for 7 weeks, was a concern about how they would fit it in to their existing workload. And it’s a truly […]
Artifact overload getting you down?
As you might’ve discovered in your own architecture work, it’s pretty easy to get overwhelmed with security architecture documentation. I remember the very first “proper” architecture description I did according to then IEEE1471:2000 (now ISO/IEC/IEEE 42010:2011) was 165 pages. And that was supposed to only be about the federated identity solution I was working on […]
How questions can make make or break your security architecture…
…and define whether you’re just playing with a security architecture modeling tool or you’re actually building security architectures that can keep your organizations safe and enable them to be successful. Yesterday I talked about the whole “because…” bit of security architecture, and there were a couple of things I didn’t tell you—frankly, because it would’ve […]
Introducing…the “Scratch Our Backside” Framework
There’s one thing you can count on, and that’s wherever security doesn’t consistently do a good job, we’re going to get as close to the problem as we can, and we’re going to spend a lot of time and energy developing some new “industry best practice” in that area, and then we’re going to release […]
- « Previous Page
- 1
- …
- 22
- 23
- 24
- 25
- 26
- …
- 41
- Next Page »