You might remember me talking about the 3 different kinds of security architecture you’re really going to need to build – or, more correctly, discover – as part of the process I call architecture archaeology. Two of them are probably pretty-familiar to you, because we tend to use them all the time as either excuses […]
Confessions of a process virgin
I’ll never forget a question that stopped me dead in my tracks early on in my days teaching the official SABSA Foundation course: “But, how are we supposed to figure out what the organization does?” a budding enterprise security architect piped up when we were going through the details of the How column. And it […]
Policy grinder
Polices. Everybody has them, and whether they’re good or bad is actually irrelevant. Because if you want to practice real security architecture in your organization, you’re going to have to eventually bite the bullet and do something with them. If you want to keep them, you have to be able to prove they actually support […]
Remember who built the spacecraft that put men on the moon?
Nope? Well, neither do I, actually. But we all remember that in 1969 the United States put the first men on the moon. The name of the company was actually two different ones: the command module was built by North American Aviation of P-51, B-25 and F-86 fame, and the lunar module was built by […]
TOGAF-crossed domains
Given that in most of the world (except Brazil) it’s Valentine’s Day weekend, I thought it would be a good time to tell a little love story of Romeo and Juliet proportions. Of course, the love story I’m talking about is the story of SABSA and TOGAF. Now SABSA is a bit of a recluse, […]
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- …
- 19
- Next Page »