Feed on
Posts
Comments

Category Archive for 'Security Architecture'

I had a client meeting recently where we started to discuss their view on security architecture and quite interesting I got several views of what security architecture actually is. As a result of that I created a set of slides that describes how I work with security architecture. Of course, there are many ways to […]

Read Full Post »

With the previous posts, I presented on a high level how fake news could be mitigated. However, there will always be some news that passes the filters, always some bully that has the technical skills to beat through. The mitigation for that is a reporting system. The architecture contains an automatic reporting component using text […]

Read Full Post »

One of the core concepts of this architecture is the management of who is allowed to comment and who is not. Normally you put that in the hands of an administrator or allow anyone to comment but that opens up for trolls and bullies. What we need is the possibility for the single individual to […]

Read Full Post »

A challenge to manage is the identity repository. Everyone has an agenda. It´s as easy as that. That creates a problem on whom to trust. But as the solutions is built on putting the power to the receiver the problem with owning the repository is a bit smaller. The central repository is actually just an […]

Read Full Post »

When it comes to fake news the common denominator is either a false identity or anonymous identity. To enable a solution for this you need to have a verified identity. No matter how you spell it, if you are going to lie and face the risk of being identified as a liar, you will stand […]

Read Full Post »

The last two years’ fake news have arisen as a problem in my world. Not only is it a problem within security but it is also a problem in many other areas like health (anti vaccine movement), political (US election) and food (anti GMO) to name a few. Common for everyone is that they either […]

Read Full Post »

Security dashboard

Last night when having a chat with a friend while flying back home we came to discuss a security dashboard and I gave him the general principles of my thoughts. From my point of view a security dashboard gives me the following: 1. Overview of my environment 2. Clearly marked where my crown jewels are […]

Read Full Post »

Vacations are supposed to be a time for contemplating and relaxation but apparently there are no rest for the wicked. I have been stuck with a few contracts regarding security SLAs where I would like to share my thoughts with you all. Security SLA is always a challenge, how to you measure that you are […]

Read Full Post »

Eco friendly hacking

Is it possible for a hacker to reduce the carbon footprint? At least it is far easier to reduce the number of password guessed by reusing the passwords stolen from other sites. This means that they don’t need to deploy as much cracking of passwords as otherwise making the use of passwords crackers as low […]

Read Full Post »

February Challenge

One of my readers wanted to know more of what type of challenges I´m facing when I´m at my clients to more understand what I do as a security architect. This month challenge is therefore how to justify a cloud strategy based on security requirements. Working at a client they asked me about cloud security […]

Read Full Post »

« Prev - Next »