The Trusted Technology Forum: Best practices for securing the global technology supply chain

Supply chain risk needs focus to be able to address the concern. If everything is “a supply chain risk,” then we can’t focus our efforts and hone in on a reasonable, achievable, practical and implementable set of practices that can lead to better supply chain practices for all, and a higher degree of confidence among purchasers. Continue reading

Security & architecture: Convergence, or never the twain shall meet?

Can the disciplines of architecture and information security do a better job of co-existence? What would that look like? Can we get to the point where security is truly “built in” versus “bolted on”? Continue reading

Cybersecurity in a boundaryless world

The core dilemma in public cybersecurity: Balancing boundarylessness and data security. The solution isn’t easy, but long-term, it lies in not relying on the security of the pipes or the perimeter, but improving the trust and security of the data itself. Security needs to be associated with data and people; not the connections and routers that carry it. Continue reading

How to write technical documentation…

Jeff Moser has written an excellent article describing how the Advanced Encryption Standard works.  He uses an very accessible paradigm – the cartoon.  He layers the description starting with a simple overview and progressively getting into m…