I know it probably shouldn’t, but it still blows me away how many people don’t really get the difference between engineering and architecture—especially in security. A good while ago now, I happened on an infosec conversation in the twitterverse talking about the composition of the ideal security team. And, of course, there were SOC people, […]
The myth of the isolated project
I was recently reminded of a pretty pervasive problem that often sneaks in to our worlds as security. That problem is the myth of the isolated project. It often starts simply enough (and if you have kids, you should recognize these warning signs): “It’s just this one time. I won’t ask you to do this […]
The boneyard of failed architecture initiatives
One thing that often happens when people finally discover that security architecture is a whole more than the way their security infrastructure is connected is that they’re all “hot to trot” and want to stand up an enterprise security architecture program from scratch. This is excellent, and one should never underestimate the power of enthusiasm. […]
To re-architect or not to re-architect your security controls
It seems the above is very much “the question” on the minds of security teams looking to take the CI/CD plunge (or who’ve already jumped in, and are splashing with the sharks without their chain-mail wetsuits). But what does it mean? This “re-architecting” of which you speak? And, just when that young lad in the […]
Never fear, the podcast is here!
I know there are more than a few people who come here and wonder about the lack of current content. I know I talked about this back in November, when I said that if you wanted to get the latest thoughts and topical tips… …you really should use the form on the home page or […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 29
- Next Page »