About 15 or 16 years ago, I was neck-deep in SOA, federated identity and defining my own framework of IEE1471:2000 views and viewpoints that I believed were the most relevant for enterprise (business) architecture, enterprise (technology) architecture and enterprise security architecture. Obviously, I was taking my first baby-steps with SABSA for the last one, but […]
Taming the security architecture beast
I was having a very interesting conversation today with a Security Architect who has done all of the SABSA training, and one of the things he mentioned was how overwhelming it all seemed. In fact, his position was that, because it was so big, it wasn’t really practical to use the whole thing—unless you were […]
Building Effective Security Architectures “rewind” sale
I’ll make this short: Today, based on conversations I’ve been having with some of you individually over the last several weeks unwilling to wait until next year because you need it right now, I’m re-opening enrollment to the Building Effective Security Architectures program (BESA for short), and from today until next Sunday the 19th, you […]
Calibrating your cloning machine
When you learn something new, there’s two main problems you need to solve. The first, obviously, is how to put what you’ve learned into practice. This can take many forms. You can take a reference – like a book, a video, your notes, photos or even just what you remember –and you can make the […]
34, 42 or 444?
It’s been said that complexity is the biggest problem we face in security, and I’ll argue that it’s doubly true when we’re talking about getting our cloud security architectures right. Because the biggest challenge we ultimately face is determining the answer to the question: What’s really different about cloud than what I’m already doing? To […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 19
- Next Page »