I’ll never forget a question that stopped me dead in my tracks early on in my days teaching the official SABSA Foundation course: “But, how are we supposed to figure out what the organization does?” a budding enterprise security architect piped up when we were going through the details of the How column. And it […]
Policy grinder
Polices. Everybody has them, and whether they’re good or bad is actually irrelevant. Because if you want to practice real security architecture in your organization, you’re going to have to eventually bite the bullet and do something with them. If you want to keep them, you have to be able to prove they actually support […]
Remember who built the spacecraft that put men on the moon?
Nope? Well, neither do I, actually. But we all remember that in 1969 the United States put the first men on the moon. The name of the company was actually two different ones: the command module was built by North American Aviation of P-51, B-25 and F-86 fame, and the lunar module was built by […]
TOGAF-crossed domains
Given that in most of the world (except Brazil) it’s Valentine’s Day weekend, I thought it would be a good time to tell a little love story of Romeo and Juliet proportions. Of course, the love story I’m talking about is the story of SABSA and TOGAF. Now SABSA is a bit of a recluse, […]
Don’t fear the framework
One thing we can pretty-much count on is that wherever we may find ourselves trying to do security architecture is going to have some kind of framework they’re using for delivering security. And one of the most popular ones of these frameworks is… …you guessed it—the NIST Cybersecurity Framework. Now, the whole “it’s just an […]
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- …
- 19
- Next Page »