Feed on
Posts
Comments

Category Archive for 'Security Architecture'

In my previous posts, I wrote a bit about security architecture. Looking at how to implement this in real life you need to start looking at your security posture. But what is your security posture exactly? When you start implementing your security you will have a number of hardware and software based protections. You will […]

Read Full Post »

Now that you understand where a security architecture start it is time to look at the full cycle of security architecture. When you have a risk register with risk for different assets you need to start working on how to mitigate those. The first task is to define the security mechanisms that are needed to […]

Read Full Post »

It´s not that easy to start creating a security architecture when it’s hard to define in the first place. A security architecture has a few starting points. The first one is the realisation that you have something to protect. That may sound as a simple thing but without your assets defined you cannot define a […]

Read Full Post »

I had a client meeting recently where we started to discuss their view on security architecture and quite interesting I got several views of what security architecture actually is. As a result of that I created a set of slides that describes how I work with security architecture. Of course, there are many ways to […]

Read Full Post »

With the previous posts, I presented on a high level how fake news could be mitigated. However, there will always be some news that passes the filters, always some bully that has the technical skills to beat through. The mitigation for that is a reporting system. The architecture contains an automatic reporting component using text […]

Read Full Post »

One of the core concepts of this architecture is the management of who is allowed to comment and who is not. Normally you put that in the hands of an administrator or allow anyone to comment but that opens up for trolls and bullies. What we need is the possibility for the single individual to […]

Read Full Post »

A challenge to manage is the identity repository. Everyone has an agenda. It´s as easy as that. That creates a problem on whom to trust. But as the solutions is built on putting the power to the receiver the problem with owning the repository is a bit smaller. The central repository is actually just an […]

Read Full Post »

When it comes to fake news the common denominator is either a false identity or anonymous identity. To enable a solution for this you need to have a verified identity. No matter how you spell it, if you are going to lie and face the risk of being identified as a liar, you will stand […]

Read Full Post »

The last two years’ fake news have arisen as a problem in my world. Not only is it a problem within security but it is also a problem in many other areas like health (anti vaccine movement), political (US election) and food (anti GMO) to name a few. Common for everyone is that they either […]

Read Full Post »

Security dashboard

Last night when having a chat with a friend while flying back home we came to discuss a security dashboard and I gave him the general principles of my thoughts. From my point of view a security dashboard gives me the following: 1. Overview of my environment 2. Clearly marked where my crown jewels are […]

Read Full Post »

Next »