Grandiose? Maybe…but hey, I’m in that kind of mood right now, because my son decided tonight was the night he wanted to watch Justice League. Fortunately, he feel asleep before the really, really scary parts at the end—well, scary for a 5 year-old…but not too scary that he didn’t want to watch it. Now, I […]
What if information didn’t flow?
About 15 or 16 years ago, I was neck-deep in SOA, federated identity and defining my own framework of IEE1471:2000 views and viewpoints that I believed were the most relevant for enterprise (business) architecture, enterprise (technology) architecture and enterprise security architecture. Obviously, I was taking my first baby-steps with SABSA for the last one, but […]
Taming the security architecture beast
I was having a very interesting conversation today with a Security Architect who has done all of the SABSA training, and one of the things he mentioned was how overwhelming it all seemed. In fact, his position was that, because it was so big, it wasn’t really practical to use the whole thing—unless you were […]
Building Effective Security Architectures “rewind” sale
I’ll make this short: Today, based on conversations I’ve been having with some of you individually over the last several weeks unwilling to wait until next year because you need it right now, I’m re-opening enrollment to the Building Effective Security Architectures program (BESA for short), and from today until next Sunday the 19th, you […]
Calibrating your cloning machine
When you learn something new, there’s two main problems you need to solve. The first, obviously, is how to put what you’ve learned into practice. This can take many forms. You can take a reference – like a book, a video, your notes, photos or even just what you remember –and you can make the […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 19
- Next Page »