Quantcast
Channel: Security Architects
Browsing all 148 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Digital Enterprises Need a Multi-Cloud Security Reference Architecture

A Security Reference Architecture model should enable businesses to create a business-centric, product-neutral, security process, and security technology savvy architecture of their own, to suit their...

View Article


How to Protect Privileged Access: Back to the Basics

Privileged access management (PAM) is a cornerstone of zero architectures and other efforts to shore up defenses against an increasingly insecure network edge and elevated danger from threat actors....

View Article


Image may be NSFW.
Clik here to view.

How can Cybersecurity Architecture Align Modern Business and Technology...

Cybersecurity architecture can show help us align business and technology concerns by providing modernized views of core processes and technologies. Today, that means focusing on a hybrid, multi-cloud...

View Article

Image may be NSFW.
Clik here to view.

The Cybersecurity Business Alignment Framework for Architecture

To ensure security architectures are relevant, you can define them using the Cybersecurity Business Alignment Framework provided in the Multi-Cloud Security Reference Architecture (“refarch”), Rational...

View Article

Image may be NSFW.
Clik here to view.

Rational Cybersecurity Webcast: Applying the 80-20 Rule

As I worked on Rational Cybersecurity for Business, I became fascinated with this question: How can we find a way to gain 80% of the benefits for 20% of the work? Considering that cybersecurity has so...

View Article


Image may be NSFW.
Clik here to view.

Updating the Multi-Cloud Cybersecurity Reference Architecture

It is time to update the Multi-cloud Cybersecurity Reference Architecture I wrote for Techvision Research in 2020. If you’re a security architect, I’d welcome your feedback. Please download a detailed,...

View Article

Image may be NSFW.
Clik here to view.

Rational Cybersecurity New Year Update

Updating the public on cybersecurity trends is not a trivial matter. At least to me, it is a vast potential topic space. Let’s outline it here and communicate further in the New Year. My World and...

View Article

Image may be NSFW.
Clik here to view.

Accounting for Cybersecurity Risk in the Business

Digital transformation demands more cybersecurity, not just because it means “more IT” but also “riskier IT.” Newer technologies – such as mobile devices, social networks, cloud computing, artificial...

View Article

Browsing all 148 articles
Browse latest View live