Review: Practical Security Architecture

Adam Shostack

” Similarly, everybody has both enterprise and product architecture. I have to say that because “architecture” is much maligned for being heavyweight, disconnected, and irrelevant in today’s world of Dev-Opsy CI/CD moving fast and breaking things.

NCSC on Good Architecture Diagrams

Adam Shostack

The UK’s National Computer Security Center has a blog post on Drawing good architecture diagrams. threat modeling

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Designing and Building a Security Architecture

Security Boulevard

A security architecture is an opportunity to work across projects in a consistent, systematic and structured. The post Designing and Building a Security Architecture appeared first on Security Boulevard.

Munich Security Conference 2022 – Last Order? ‘East-West Relations And The European Security Architecture’

Security Boulevard

‘East-West Relations And The European Security Architecture’ appeared first on Security Boulevard. Security Bloggers Network European Security EuroSecurity Architecture MSC2022 Nation State Security

Reinforcing Your Azure Cloud Security Architecture

Security Boulevard

The post Reinforcing Your Azure Cloud Security Architecture appeared first on Sonrai Security. The post Reinforcing Your Azure Cloud Security Architecture appeared first on Security Boulevard.

Monolithic vs. Microservices Architecture: Which Should I Use?

Security Boulevard

In this post we learn about monolithic vs microservices architectures and understand which to use and when. The post Monolithic vs. Microservices Architecture: Which Should I Use? The post Monolithic vs. Microservices Architecture: Which Should I Use?

The Rise of Telemetry Architecture

Cisco Security

It is infrastructure for your telemetry so that you can go about putting together an architecture that serves your digital business. The Cisco Telemetry Broker is required infrastructure for a healthy telemetry architecture.

The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips

Cisco CSR

On the heels of President Biden’s Executive Order on Cybersecurity (EO 14028) , the Office of Management and Budget (OMB) has released a memorandum addressing the heads of executive departments and agencies that “sets forth a Federal zero trust architecture (ZTA) strategy.”

What Is Zero Trust Architecture All About?

SecureBlitz

Here, we will show you what Zero Trust Architecture is all about, its concepts, and why it emerging as a new cybersecurity paradigm. The post What Is Zero Trust Architecture All About?

What Are the Pros and Cons of a SASE Architecture?

Dark Reading

SASE is a promising and burgeoning networking architecture approach, but it's not without some challenges

10 Ways a Zero Trust Architecture Protects Against Ransomware

Tech Republic Security

The post 10 Ways a Zero Trust Architecture Protects Against Ransomware appeared first on TechRepublic. While ransomware has been around for decades, its prevalence has exploded over the last two years.

Strengthening Zero-Trust Architecture

Dark Reading

Organizations that want to stay ahead of cybercriminals will find that going beyond user trust and device trust is critical for outwitting their adversaries

Cybersecurity Mesh Architecture: Hope or Hype?

Dark Reading

Gartner has touted CSMA as one of the top technology trends for this year. But what is it really

No Integrity, No Trust. The Foundation of Zero Trust Architecture

Security Boulevard

In the episode, Tripwire’s Maurice Uenuma discusses the role of integrity when it comes to zero trust architecture. The Foundation of Zero Trust Architecture appeared first on The State of Security. The Foundation of Zero Trust Architecture appeared first on Security Boulevard.

Analysis of EU Digital Identity Architecture and Reference Framework | Avast

Security Boulevard

The post Analysis of EU Digital Identity Architecture and Reference Framework | Avast appeared first on Security Boulevard. Special thanks to Ivan Basart of ValidatedID, Viky Manaila of Intesi Group, and Harm Jan Arendshorst of iLabs for their input.

How to Push a Massive Architectural Change | anecdotes

Security Boulevard

We recently worked on shifting from a single-tenant identity architecture to a more multi-tenant architecture. The post How to Push a Massive Architectural Change | anecdotes appeared first on Security Boulevard.

Processor Morphs Its Architecture to Make Hacking Really Hard

Dark Reading

Researchers create a processor that uses encryption to modify its memory architecture during runtime, making it very difficult for hackers to exploit memory-based vulnerabilities

NSA Releases Guidance on Zero-Trust Architecture

Dark Reading

A new document provides guidance for businesses planning to implement a zero-trust system management strategy

Building a Cybersecurity Mesh Architecture in the Real World

Dark Reading

Like zero trust, the cybersecurity mesh re-envisions the perimeter at the identity layer and centers upon unifying disparate security tools into a single, interoperable ecosystem

Cloud Security Architecture Needs to Be Strategic, Realistic, and Based on Risk

Dark Reading

Info-Tech Research Group has released a new research blueprint to help organizations plan the components necessary to build a cloud security architecture

Threat Model Thursday: Legible Architecture

Adam Shostack

What’s the legible architecture of a system? One of the advantages that cloud architectures bring is the opportunity to sweep away some of that historical complexity, and to create comprehensible models. That simplification carries value in terms of architectural consistency, makes it easier to impose checkpoints, and will be augmented over time with the accretion of complexity, inflexibility and eventually need to be swept away itself.

Edge computing: The architecture of the future

CSO Magazine

To fully digitize the last mile of business, you need to distribute compute power where it's needed most -- right next to IoT devices that collect data from the real world

Building, Tracing, and Monitoring Event-Driven Architectures on Google PubSub and BigQuery

Security Boulevard

And we present a basic event-driven architecture (EDA) for basic use cases. The post Building, Tracing, and Monitoring Event-Driven Architectures on Google PubSub and BigQuery appeared first on Security Boulevard. The use of distributed systems is increasing day by day.

How Zero Trust architecture improves the organization’s network security

CyberSecurity Insiders

The post How Zero Trust architecture improves the organization’s network security appeared first on Cybersecurity Insiders. This blog was written by an independent guest blogger. In the cybersecurity field, Zero Trust is becoming a widely used model.

Securing APIs: Application Architecture Disrupted

Security Boulevard

In the series, we’ll go through how application architecture and the attack surface is changing, how application security needs to evolve to deal with these disruptions, and how to empower security in an environment where DevOps rules the roost. Application Architecture Today.

OWASP® Global AppSec US 2021 Virtual – Fraser Scott’s ‘Automating Architectural Risk Analysis With The Open Threat Model Format’

Security Boulevard

The post OWASP® Global AppSec US 2021 Virtual – Fraser Scott’s ‘Automating Architectural Risk Analysis With The Open Threat Model Format’ appeared first on Security Boulevard. Application Security Security Bloggers Network AppSec Conferences appsec education education Global AppSec US ’21 owasp security Security Architecture

Unique P2P Architecture Gives DDG Botnet ‘Unstoppable’ Status

Threatpost

Malware Web Security analysis cryptomining ddg botnet Monero netlab 360 P2P peer to peer unique architecture unstoppableDDG might be the world's first P2P-based cryptomining botnet.

AttackIQ Announces Major Platform Innovations to Bolster Informed Defense Architecture

Security Boulevard

–(BUSINESS WIRE)–AttackIQ®, the leading independent vendor of Breach and Attack Simulation (BAS) systems, today announced a series of technology innovations to the AttackIQ Informed Defense Architecture (AIDA).

The Architectural Mirror (Threat Model Thursdays)

Adam Shostack

I last discussed this in “ Architectural Review and Threat Modeling “ ). A few weeks ago, I talked about “ reflective practice in threat modeling “, thinking about how we approach the problems we face, and asking if our approaches are the best we can do. Sometimes it’s hard to reflect. It’s hard to face the mirror and say ‘could I have done that better?’ ’ That’s human nature.

Zero Trust Architecture for Healthcare – 7 Common Pitfalls to Avoid

Security Boulevard

The post Zero Trust Architecture for Healthcare – 7 Common Pitfalls to Avoid appeared first on Forescout. The post Zero Trust Architecture for Healthcare – 7 Common Pitfalls to Avoid appeared first on Security Boulevard.

Case Study: High Security Architecture for Healthcare Networks

Security Boulevard

We recently worked with one of the largest hospitals in Canada to enhance their Privileged Access Management strategy as they adopted a new, high-security architecture. The team set up an architecture in which one Distributed Engine handles the Tier 0 systems and the other Tier 1.

Building a Scalable Security Architecture on AWS with Cisco Secure Firewall and AWS Transit Gateway

Cisco Retail

It makes architectures more scalable, in part by removing the need for source network address translation (SNAT) in the traffic path. Figure 1 below shows a scalable architecture for protecting ingress traffic using Cisco Secure Firewall and AWS Gateway Load Balancer.

Building a scalable RAVPN architecture in Oracle Cloud Infrastructure using Cisco Secure Firewall

Cisco Retail

With Cisco Secure Firewall, organizations are able to build a scalable RAVPN architecture on OCI, providing employees secure remote access to their organization’s resources from any location or endpoint. In this architecture, we have deployed multiple firewalls in multi-availability domains.

How to evolve your organization into a data-centric security architecture

CyberSecurity Insiders

The post How to evolve your organization into a data-centric security architecture appeared first on Cybersecurity Insiders. This blog was written by an independent guest blogger.

Intertrust Adds Security for IoT Devices in Zero-Trust Architectures to Intertrust Platform

Dark Reading

New features provide for end-to-end security and interoperability between data operations and multivendor IoT devices

Creating a Defensible Security Architecture

Dark Reading

You'll be able to layer in multiple prevention and detection solutions and have a highly effective security architecture Take the time to learn about your assets.

Taking Steps Toward an Impactful SASE Architecture

Security Boulevard

The post Taking Steps Toward an Impactful SASE Architecture appeared first on Security Boulevard. Given the complexity of digitization initiatives for most companies over the last decade, the world has grown acutely aware of how crucial good cybersecurity is for business health.

What's Your Cybersecurity Architecture Integration Business Plan?

Dark Reading

To get the most out of your enterprise cybersecurity products, they need to work together. But getting those products talking to each other isn't easy

What is 5G security? Explaining the security benefits and vulnerabilities of 5G architecture

CyberSecurity Insiders

Defining 5G security and architecture. Delving into the technical details of the 5G security architecture is beyond the scope of this article. Explaining the security benefits and vulnerabilities of 5G architecture appeared first on Cybersecurity Insiders.

Three Steps to Complete Your Zero Trust Architecture

Security Boulevard

But Zero Trust Architecture is incomplete without device firmware and hardware verification. The post Three Steps to Complete Your Zero Trust Architecture appeared first on Security Boulevard. Zero Trust is a critical strategy for defending our ever-growing digital attack surfaces.

Containers require good architecture

InfoWorld on Security

Gartner is predicting growing container adoption by 2023, believe it or not. Are you sitting down? Data from its survey shows a surge in containerization of applications (and data).

Zero Trust Architecture &  Elements of Multi-Factor Authentication

Security Boulevard

The post Zero Trust Architecture & Elements of Multi-Factor Authentication first appeared on SecureFLO. The post Zero Trust Architecture & Elements of Multi-Factor Authentication appeared first on Security Boulevard.

Ericom Survey Shows Shift to Zero-Trust IT Architectures

Security Boulevard

The post Ericom Survey Shows Shift to Zero-Trust IT Architectures appeared first on Security Boulevard.