Hybrid By Design Vs. Hybrid By Accident

As a veteran of enterprise IT, there’s a difference between “hybrid by design” and “hybrid by accident.” Let’s be frank: you are probably doing hybrid by accident – just about everybody is. Hybrid by accident is: Integrating public cloud with on-premises tech without standardizing on a common infrastructure-as-code practice Shadow IT cloud “experiments” that suddenly […]

Conducting an Architectural Risk Assessment — Step 1

An architectural risk assessment is not a penetration test or merely a vulnerability scan. It is an engineering process with the aim of understanding, defining, and defending all the functional output from customers, line workers, corporate staff, and client-server interactions. Architectural risk assessments include ethical hacking, source code review, and the formation of a new Read more

Conducting an Architectural Risk Assessment — Step 1

An architectural risk assessment is not a penetration test or merely a vulnerability scan. It is an engineering process with the aim of understanding, defining, and defending all the functional output from customers, line workers, corporate staff, and client-server interactions. Architectural risk assessments include ethical hacking, source code review, and the formation of a new Read more

Endpoint Security Solutions Offer A First Line Of Defense Against Cyberthreats

The number and complexity of cyberthreats are increasing. Traditional antimalware tools may not be adequate to protect your organization. As hackers create new, more-sophisticated malware, endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. Why is this important? Because employee endpoints are the interface between employees and […]

Architecture Corner: We are special – Seven Deadly Sins of IT

Episode 6 of this season of Architecture Corner is out (I made a guest appearance in episode 1, “Good at Innovation”). In this installment, the CIO is a glutton for new data center capacity. Chris the CEO (Casimir Artmann) and John the CIO (Greger Wikstrand) are convinced that “we are special”. Can Ann the CFO […]

Innovation in Inner Space

  Long-time readers know that I have a rather varied set of interests and that I’ve got a “thing” for history, particularly military history. Knowing that, it shouldn’t come as a surprise that I was recently reading an article titled “Cyber is the fourth dimension of war” (ground, sea and air being the first three […]

What is Open FAIR™?

By Jim Hietala, VP, Business Development and Security, The Open Group Risk Practitioners should be informed about the Open FAIR body of knowledge, and the role that The Open Group has played in creating a set of open and vendor-neutral … Continue reading

Form Follows Function on SPaMCast 426

One of the benefits of being a regular on Tom Cagley’s Software Process and Measurement (SPaMCast) podcast is getting to take part in the year-end round table (episode 426). Jeremy Berriault, Steve Tendon, Jon M. Quigley and I joined Tom for a discussion of: Whether software quality would be a focus of IT in 2017 […]

Looking Forward to a New Year

By Steve Nunn, President & CEO, The Open Group As another new year begins, I would like to wish our members and The Open Group community a happy, healthy and prosperous 2017! It’s been nearly 15 months since I transitioned … Continue reading

China’s Cybersecurity Law Challenges Foreign Companies To Accelerate Their Digital Transformation

On November 7, China’s top legislature adopted a cybersecurity law to safeguard the sovereignty on cyberspace, national security, and the rights of citizens. The law has seven chapters that define specific regulations in various areas, such as network …

EAdirections Tenth Anniversary Observations

Through ten years of working with dozens of companies, we have seen a lot of good and some not so good developments related to Enterprise Architecture. In recognition of those 10 years, those dozens of companies, and continued success, we would like t…