Instead of taking the day off for parades and pubs (especially if you’re in Dublin), this St. Patricks Day may find you faced with a whole new array of cloud security questions driven by the work-from-home directives and necessities of the communities in which you live and work. And, even if things have started to […]
Fighting FOMO in your security operations
This morning when I was thinking about which of the dozens of ideas I have for a COSAC presentation I’d actually submit, I was re-reading some Gartner guidance on preparing for the future of security. (A brief, totally voluntary PSA: if you’re thinking of speaking at one of the COSAC conferences, the CFP closes today. […]
Why issues with “secrets management” in DevOps aren’t tool problems
Like you, I get a lot of “You MUST watch this webinar” types of emails, and one of the last ones I got that somewhat piqued my interest given some things I’m helping a coaching and mentoring client with was a new one about the ever-present pipe dream promise of “Shift left” with DevSecOps. Ostensibly, […]
Cisco’s CISO gets it right—but is off by 80%
In today’s long list of emails was a link to an interview from RSA with Jeff Reed, Cisco’s CISO talking about why complexity is a top challenge for CISOs. Those of you who remember some of my previous emails – especially those talking about the launch of The Agile Security System™ itself last July – […]
Why worrying about “being slow” is shaking the wrong tree
No, I’m not talking about whether you may have two or three toes. I’m talking about the real issue behind the 7th, and actually the far deadliest of security architecture sins: sloth. Thanks to our toe-challenged friend, we tend to think of sloth as being simply slow. Sure, this is a problem—especially in security architecture. […]
- « Previous Page
- 1
- …
- 8
- 9
- 10
- 11
- 12
- …
- 29
- Next Page »