…or did they? Where we live in Cape Town, we’re surrounded by houses. And, somewhere in this maze of walled dwellings live no less than 3 cats. There’s two black ones, and there’s one that’s kinda grey/brown. All of them think our yard is the best place in the world to play, hunt…and, not so […]
Stepping in mythical maturity mud puddles
While this is something I’ve written about before, it’s not normally something that comes up quite so strongly and quite so often in the same day. That “something” is the myth of some magical level of maturity in your security program when “things will happen.” When we get [magical maturity level], then we can be […]
Can you really make security architecture a habit?
Interestingly enough, I was listing to a podcast yesterday on how to train your brain regarding habits with Tara Swart, a neuroscientist and senior lecturer from MIT and Nir Eyal, a behavioral designer. I really enjoy all this psychology and neuroscience stuff, as you might’ve noticed, because it’s one of the best ways I’ve discovered […]
A potential cure for cybersecurity envy
Since Thanksgiving is now in the rear-view mirror, we can start talking about what’s next for the end of the year. And for a lot of people, that means shopping for Christmas. One of the things I remember about being a kid was that one of my friends in particular used to get all the […]
Cutting through the business-driven bullshite like a hot knife through butter
As you might remember, the subject of the next Security Sanity™ print newsletter is all about security governance, and, governance in general within the concepts and foundational rules established by SABSA. And in talking to people about it a lot of the time, we get tangled up in assumptions about what we really mean when […]
- « Previous Page
- 1
- …
- 9
- 10
- 11
- 12
- 13
- …
- 19
- Next Page »
