It’s been said that complexity is the biggest problem we face in security, and I’ll argue that it’s doubly true when we’re talking about getting our cloud security architectures right. Because the biggest challenge we ultimately face is determining the answer to the question: What’s really different about cloud than what I’m already doing? To […]
Framework use vs. alignment
Having almost survived day one of #SAlockdown, I’m going to give the COVID kids a rest for today. Instead, I’m going to talk about something that I’d encountered before in some conversations with people who had/use SABSA, but which, honestly, I didn’t quite understand until I was working on the upcoming April issue of the […]
Easy security reporting recipes
When it comes to security reports, we often tend to take a page out of the book of W.C. Fields: “If you can’t dazzle them with brilliance, baffle them with bullshite.” …at least that’s how a lot of them are received by their audience, anyway. Of course, weeee don’t think they’re bullshite. They make perfect […]
“Mind blowing” security architecture
Today’s been a bit hectic for me, so I’m going keep this one short. It’s inspired by a conversation I just had with someone we’ve worked with previously who reminded me that of all the stuff I’ve talked about so far, one of the the…well, many things I haven’t yet talked about that you’ll learn […]
Busting the Zero-Trust drug dealers
This “zero trust” thing is really starting to get out of hand. It’s clearly the newest security drug everyone seems to be pimping on every street corner—from vendors to advisors to the media. “Pssst….hey buddy. I know they say you can’t buy it, but…wanna fix?” The reason it’s so important to get these low-class dealers […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- 6
- …
- 19
- Next Page »