Yesterday, I mentioned going through all those reference architects and architecture examples. And another thing I found was something else I really don’t like: The assumption that control library deployments is all the “security architecture” you really need. Obviously, if you’ve been around for long enough, you know this is true. Control libraries are…well, they’re […]
Security architecture confusion
I’ve been looking at a lot of “security architecture” recently, including some live, organizational architectures, some “off the cuff” things that I’d call security architecture “sketches”, and some formalized, published reference architecture models. And it hit me when I was taking a break, sitting in the fleeting sunshine this afternoon and listening to some Jimi […]
Why “security” may only be doing part of the job
One of the biggest problems in security that comes up over and over again is trying to demonstrate the value of what we do. After all, to the majority of the people, we’re just a cost center. As the old saying goes, they’re giving us money… …so that nothing bad happens. As I’ve alluded to […]
Your mission: save the world
Grandiose? Maybe…but hey, I’m in that kind of mood right now, because my son decided tonight was the night he wanted to watch Justice League. Fortunately, he feel asleep before the really, really scary parts at the end—well, scary for a 5 year-old…but not too scary that he didn’t want to watch it. Now, I […]
What if information didn’t flow?
About 15 or 16 years ago, I was neck-deep in SOA, federated identity and defining my own framework of IEE1471:2000 views and viewpoints that I believed were the most relevant for enterprise (business) architecture, enterprise (technology) architecture and enterprise security architecture. Obviously, I was taking my first baby-steps with SABSA for the last one, but […]
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- 9
- …
- 29
- Next Page »