As you might’ve discovered in your own architecture work, it’s pretty easy to get overwhelmed with security architecture documentation. I remember the very first “proper” architecture description I did according to then IEEE1471:2000 (now ISO/IEC/IEEE 42010:2011) was 165 pages. And that was supposed to only be about the federated identity solution I was working on […]
How questions can make make or break your security architecture…
…and define whether you’re just playing with a security architecture modeling tool or you’re actually building security architectures that can keep your organizations safe and enable them to be successful. Yesterday I talked about the whole “because…” bit of security architecture, and there were a couple of things I didn’t tell you—frankly, because it would’ve […]
Introducing…the “Scratch Our Backside” Framework
There’s one thing you can count on, and that’s wherever security doesn’t consistently do a good job, we’re going to get as close to the problem as we can, and we’re going to spend a lot of time and energy developing some new “industry best practice” in that area, and then we’re going to release […]
Why being an effective security architect is a lot like being an effective parent
And no, I’m not going to go with “because the business acts like children, always trying to tear the walls down.” This was something that actually came to me tonight when I was making a very simple lemon pasta dish (very quick) and my two kids (5 and 2.5) were wanting to bounce their bouncers? […]
A dangerous myth about security architecture
…that needs to be taken behind the shed and shot D-E-D. Dead! And then cut up into 100 pieces and buried deep in the ground, much like the the Blood Queen Nimue in the latest Hellboy—lest it comes back to lay waste to the entire planet… …or at least to the organization you’re trying to […]
- « Previous Page
- 1
- …
- 19
- 20
- 21
- 22
- 23
- …
- 29
- Next Page »