If you’re reading this email, I’m pretty sure I don’t have to tell you about the merits of business-driven security architectures. And, even if, for some reason, you’re not entirely convinced that there’s more to “security architecture” than infrastructure diagrams, that’s not what I’m here to talk to you about today. Today, we’re going to […]
3 Security Architects
As you might recall, my 2 year old likes to sing. In fact, she sings literally hours every day. When we’re on the way to school, she sings. When she’s taking a bath, she sings. And since we got her and her brother a kiddie karaoke cube for Christmas, she wants to sing pretty much […]
The honest security architect
The agenda for today was actually pretty straightforward. My mother’s still visiting for the holidays for a bit longer, and things have been a bit hectic, so we haven’t really managed to do all that much “touristy” stuff this time around. So the plan was to let her visit a couple of wineries, then have […]
Don’t read this post unless you’re funding your own security skill development
I’ll keep this short and to the point. As you probably know, I’ve been harping on about the next run of our Building Effective Security Architectures course for a few weeks now, and as of today, we’re exactly 1 month from when everyone who’s already joined the program will have access to the first week’s […]
Curiosity kills cats, not architects…so what does?
Today I was having a good chat with a friend of mine and fellow Enterprise Security Architect about what’s been going on in his world since we last spoke. Now my friend has been around the block more than a few times, has been a “real” architect for many years, and has 2 levels of […]
- « Previous Page
- 1
- …
- 15
- 16
- 17
- 18
- 19
- …
- 29
- Next Page »
