The way I see it, the ultimate litmus test for whether your security architecture is up to the job boils down to the answers to these two questions: Does it enable the right decisions to be made by the right people to keep the organization safe? Does it document the existing decisions in sufficient detail […]
And the architect came back, the very next day…
…or did they? Where we live in Cape Town, we’re surrounded by houses. And, somewhere in this maze of walled dwellings live no less than 3 cats. There’s two black ones, and there’s one that’s kinda grey/brown. All of them think our yard is the best place in the world to play, hunt…and, not so […]
Stepping in mythical maturity mud puddles
While this is something I’ve written about before, it’s not normally something that comes up quite so strongly and quite so often in the same day. That “something” is the myth of some magical level of maturity in your security program when “things will happen.” When we get [magical maturity level], then we can be […]
Avoiding the training course hangover
Training courses have lots of good things going for them, but one of the bad things that can happen – especially in live, in-person training courses – is that there’s so much material to cover in the 3 or 5 days of sessions, you’re almost always bound to hit that point exemplified by the classic […]
Can you really make security architecture a habit?
Interestingly enough, I was listing to a podcast yesterday on how to train your brain regarding habits with Tara Swart, a neuroscientist and senior lecturer from MIT and Nir Eyal, a behavioral designer. I really enjoy all this psychology and neuroscience stuff, as you might’ve noticed, because it’s one of the best ways I’ve discovered […]
- « Previous Page
- 1
- …
- 20
- 21
- 22
- 23
- 24
- …
- 29
- Next Page »