By Dana Gardner, Interarbor Solutions For some, any move to the Cloud — at least the public Cloud — means a higher risk for security. For others, relying
By Pascal de Koning, KPN You want to put your company’s business strategy into action. What’s the best way to accomplish this? This can be done in
By Jim Hietala, Vice President, Security, The Open Group 2011 confirmed what many in the Enterprise Architecture industry have feared – data breaches are on
As the IT environment has changed significantly over the past several years, members of the Security Forum saw a need to revisit the document, Enterprise Security Architecture, and to update the guidance contained in it to address changes including mobile device security, and new categories of security controls such as data loss prevention. Learn about the new download here.
Can the disciplines of architecture and information security do a better job of co-existence? What would that look like? Can we get to the point where security is truly “built in” versus “bolted on”?