If you’ve been following along for even a little while, you might remember that I’ve been spending a lot of time back in Cape Town since about August. You might also remember a rant—er, a story or two about a thing called load shedding that they do in South Africa. Basically, it’s (generally) planned, neighborhood-wide […]
A tale of two banks (and 2 lessons for security architects)
You might remember that my mother has been visiting us since just before Christmas, and you might also remember that I’m from the US, so…that’s where she lives. Not only that, it’s where she banks and where she has her mobile phone service (unsurprisingly). Given the almost daily deafening stampede of credit card details we […]
Let there be Security Architecture!
Without a doubt, one of the biggest stumbling blocks for people attempting to create security architectures that align with the business, veritably scream the value they create and which underpin and drive the entirety of an effective security program that enables and protects the organization… Is getting started. Whatever your thoughts on religion might be, […]
I said…read the damn policy—or the puppy dies
I get it. I really do. The old saying of “You can lead a horse to water, but you can’t make him drink,” seems to be one of the most frustrating truths in security. I remember on one particular, highlight politicized, multi-vendor public sector project I was on, it was enough to literally make me […]
Nobody cares you don’t have a “real” security architecture
If you’re reading this email, I’m pretty sure I don’t have to tell you about the merits of business-driven security architectures. And, even if, for some reason, you’re not entirely convinced that there’s more to “security architecture” than infrastructure diagrams, that’s not what I’m here to talk to you about today. Today, we’re going to […]
- « Previous Page
- 1
- …
- 14
- 15
- 16
- 17
- 18
- …
- 29
- Next Page »