Yesterday I had a brilliant (and, fortunately, public) reminder of how often the life of a security architect is effectively lost in a wasteland of “architecture” that people genuinely believe is a useful depiction of the state of the world—or an organization. This time, the example was provided on Twitter with a brief “IT architect […]
The 3 little security programs
Whether we consciously recognize it or not, the stories we grow up with tend to influence our thinking more than we might realize. And that’s a good thing, and in fact, it’s probably one of the reasons humans have lived as long as they have without all being eaten by prehistoric critters. It’s one pretty […]
Rush, rabbits and reality
Since my last email was a bit of musically-inspired guidance on what not to do as a security architect, I thought I’d continue the theme today with probably the best, most direct – and most effective – advice I’ve ever heard about the practice of architecture from a band called Rush. The lead track of […]
Is there a little too much Johnny Cash in your framework?
You might’ve heard me talk about this a bit in the past, but I grew up in East-Central Illinois on a farm in the ‘70s and ‘80s. And one of the things I grew up listening to on the radio – until I had one of my own – was Country & Western music. I […]
5 reasons why security architecture’s not for sissies
One of the first things you tend to hear when you arrive in Africa – and South Africa, particularly – is the phrase, “Africa’s not for sissies.” And there’s good reason for this. The daily power cuts impacting the whole country, including the “Mother City” herself…a healthy population of poisonous snakes many of our friends […]
- « Previous Page
- 1
- …
- 13
- 14
- 15
- 16
- 17
- …
- 29
- Next Page »