The Cybersecurity Business Alignment Framework for Architecture
To ensure security architectures are relevant, you can define them using the Cybersecurity Business Alignment Framework provided in the Multi-Cloud Security Reference Architecture (“refarch”), Rational Cybersecurity for Business (“the book”), and a few other tools.
How can Cybersecurity Architecture Align Modern Business and Technology Concerns?
Cybersecurity architecture can show help us align business and technology concerns by providing modernized views of core processes and technologies. Today, that means focusing on a hybrid, multi-cloud IT environment. To really deep dive on this, please sign up for… Continue reading
How to Protect Privileged Access: Back to the Basics
Privileged access management (PAM) is a cornerstone of zero architectures and other efforts to shore up defenses against an increasingly insecure network edge and elevated danger from threat actors. Please register here to join our webcast Thursday June 17 at… Continue reading
Digital Enterprises Need a Multi-Cloud Security Reference Architecture
A Security Reference Architecture model should enable businesses to create a business-centric, product-neutral, security process, and security technology savvy architecture of their own, to suit their circumstances. At a minimum, such models should provide diagrams you can modify to fit… Continue reading
Which is Easier: Aligning Business to Security, or Security to Business?
Which is Easier: Getting Businesspeople to think in terms of Security, getting Security Teams to think in terms of Business? While security leaders should work both angles, I say the correct answer to Alyssa Miller’s original question (below) is “B”.… Continue reading
What we Can Learn from the SolarWinds Supply Chain Breach
Working Together to Create the Future of Security Architecture
The world really needs to take security architecture more seriously! If physical buildings were anything like security systems (experiencing a major breach practically every month), the news would be full of collapsing buildings and crumbling bridges. That’s why I’m pleased… Continue reading
Pathways to Unified Endpoint Management (UEM)
Would you like to learn more Unified Endpoint Management (UEM) – and of course security – strategies? If so, please register for my November 12 webinar!
Title: Pathways to Unified Endpoint Management (UEM)
5 Tips for Deploying Cloud PAM
Privileged account management for the cloud (cloud PAM) is at long last becoming easier to deploy. To see why, check out my September 17 webinar for BeyondTrust – The Expanding Universe of Privileges: Why Cloud PAM Matters. Therein,… Continue reading
The Expanding Universe of Privileges: Why Cloud PAM Matters (Webcast)
Would you like to learn how Privileged Account Management (PAM) systems should cover cloud environments? If so, please register for my September 17 webinar!
Title: The Expanding Universe of Privileges: Why Cloud PAM Matters (Webcast)