I was recently reminded of a pretty pervasive problem that often sneaks in to our worlds as security. That problem is the myth of the isolated project. It often starts simply enough (and if you have kids, you should recognize these warning signs): “It’s just this one time. I won’t ask you to do this […]
The boneyard of failed architecture initiatives
One thing that often happens when people finally discover that security architecture is a whole more than the way their security infrastructure is connected is that they’re all “hot to trot” and want to stand up an enterprise security architecture program from scratch. This is excellent, and one should never underestimate the power of enthusiasm. […]
To re-architect or not to re-architect your security controls
It seems the above is very much “the question” on the minds of security teams looking to take the CI/CD plunge (or who’ve already jumped in, and are splashing with the sharks without their chain-mail wetsuits). But what does it mean? This “re-architecting” of which you speak? And, just when that young lad in the […]
Never fear, the podcast is here!
I know there are more than a few people who come here and wonder about the lack of current content. I know I talked about this back in November, when I said that if you wanted to get the latest thoughts and topical tips… …you really should use the form on the home page or […]
What to do when your security program has more mice than a science lab
There was a really interesting point in a Cisco survey I read over the last few days that was talking about the overall confidence levels of security leaders regarding their ability to keep their organizations safe. And, actually, it’s something I’ve also seen come up pretty regularly when I talk to security leaders, architects and […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 29
- Next Page »