Underfunding IT security programs
Security professionals rarely say that things are getting better on the threat side of information security. Underfunding IT security programs is a recipe for disaster. Continue reading →![]()
Aggregated enterprise architecture wisdom
Security professionals rarely say that things are getting better on the threat side of information security. Underfunding IT security programs is a recipe for disaster. Continue reading →![]()
A recent article estimated that 65% or more of new enterprise IT spending will be cloud-based by 2015. Tell us what you think. Continue reading →![]()
ArchiMate® is an open and independent graphical modeling language for enterprise architecture, but that’s only the start of the matter. It’s much more appropriate to see it as a stakeholder management tool. When used in conjunction with an EA framework like TOGAF™, ArchiMate takes on a new dimension and delivers an ability to communicate and collaborate with stakeholders through the creation of clear models, based on viewpoints that have a common foundation in both TOGAF and ArchiMate.
Continue reading →![]()
Until recently, virtually all IT certifications have been based on an individual’s recollection of a body of knowledge and their ability to pass a computer-based test. Perhaps a better method of evaluating competence to carry out a specific role is to examine the skills and experience that an individual has demonstrated in his/her work. Continue reading →![]()
Business decision makers aren’t interested in the details, but they want to know important IT decisions being made in their business are in the hands of true professionals. Certification verifies the qualities and skills IT executives have with regards to the effective deployment, implementation and operation of IT solutions. Continue reading →![]()
Supply chain risk needs focus to be able to address the concern. If everything is “a supply chain risk,” then we can’t focus our efforts and hone in on a reasonable, achievable, practical and implementable set of practices that can lead to better supply chain practices for all, and a higher degree of confidence among purchasers. Continue reading →![]()
In nature, nothing is ever more complex than necessary: A lesson for Enterprise Architects. So, like evolution, TOGAF™ is a catalyst to appropriate change, creating the infrastructure and momentum behind business strategy, simplifying the organization and ensuring that it is never more complex than it actually needs to be. Continue reading →![]()
Open Group introduces the SOA Ontology Technical Standard: Have a look at the new SOA Ontology and see if it can help you in your communications for SOA. Continue reading →![]()
Can the disciplines of architecture and information security do a better job of co-existence? What would that look like? Can we get to the point where security is truly “built in” versus “bolted on”? Continue reading →![]()
The core dilemma in public cybersecurity: Balancing boundarylessness and data security. The solution isn’t easy, but long-term, it lies in not relying on the security of the pipes or the perimeter, but improving the trust and security of the data itself. Security needs to be associated with data and people; not the connections and routers that carry it. Continue reading →![]()
Don’t try to change your business leaders. They have a job to do. Your job is to change the ways you communicate, react and respond to your business leaders. Continue reading →![]()
What do you do when you are full of ideas, are privy to the collaboration initiatives between the top IT, security and EA professionals in the world, and have a lot to say? You start a blog, of course. Welcome … Continue reading →![]()