Review: Practical Security Architecture

Adam Shostack

” Similarly, everybody has both enterprise and product architecture. I have to say that because “architecture” is much maligned for being heavyweight, disconnected, and irrelevant in today’s world of Dev-Opsy CI/CD moving fast and breaking things.

Edge computing: The architecture of the future

CSO Magazine

To fully digitize the last mile of business, you need to distribute compute power where it's needed most -- right next to IoT devices that collect data from the real world

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Designing and Building a Security Architecture

Security Boulevard

A security architecture is an opportunity to work across projects in a consistent, systematic and structured. The post Designing and Building a Security Architecture appeared first on Security Boulevard.

NCSC on Good Architecture Diagrams

Adam Shostack

The UK’s National Computer Security Center has a blog post on Drawing good architecture diagrams. threat modeling

Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures

Security Boulevard

The Bitglass SmartEdge SWG architecture uniquely addresses these concerns in several ways. The post Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures appeared first on Security Boulevard.

Strengthening Zero-Trust Architecture

Dark Reading

Organizations that want to stay ahead of cybercriminals will find that going beyond user trust and device trust is critical for outwitting their adversaries

The Rise of Telemetry Architecture

Cisco Security

It is infrastructure for your telemetry so that you can go about putting together an architecture that serves your digital business. The Cisco Telemetry Broker is required infrastructure for a healthy telemetry architecture.

How Zero Trust architecture improves the organization’s network security

CyberSecurity Insiders

The post How Zero Trust architecture improves the organization’s network security appeared first on Cybersecurity Insiders. This blog was written by an independent guest blogger. In the cybersecurity field, Zero Trust is becoming a widely used model.

Service Oriented Architecture and Security

Doctor Chaos

Written by Mike Oliver LinkedIn: https://www.linkedin.com/in/mikeolivero4bo Website: [link] So what does Security, Cyber Crimes, Denial of Service, and other Security Concerns have to do with a Service Oriented Architecture? Does having a Service Oriented Architecture translate into having a more secure enterprise? Certainly having an Enterprise Architecture can translate into better security […].

Processor Morphs Its Architecture to Make Hacking Really Hard

Dark Reading

Researchers create a processor that uses encryption to modify its memory architecture during runtime, making it very difficult for hackers to exploit memory-based vulnerabilities

CISA's Cloud Security Technical Reference Architecture: Where it succeeds and where it falls short

CSO Magazine

President Biden’s Executive Order 14028 “Improving the Nation’s Cybersecurity” directed the Cybersecurity and Infrastructure Security Agency (CISA) to create a cloud-security technical reference architecture (RA ) in coordination with the Office of Management and Budget (OMB) and the Federal Risk and Authorization Management Program ( FedRAMP ).

Securing APIs: Application Architecture Disrupted

Security Boulevard

In the series, we’ll go through how application architecture and the attack surface is changing, how application security needs to evolve to deal with these disruptions, and how to empower security in an environment where DevOps rules the roost. Application Architecture Today.

Case Study: High Security Architecture for Healthcare Networks

Security Boulevard

We recently worked with one of the largest hospitals in Canada to enhance their Privileged Access Management strategy as they adopted a new, high-security architecture. The team set up an architecture in which one Distributed Engine handles the Tier 0 systems and the other Tier 1.

AttackIQ Announces Major Platform Innovations to Bolster Informed Defense Architecture

Security Boulevard

–(BUSINESS WIRE)–AttackIQ®, the leading independent vendor of Breach and Attack Simulation (BAS) systems, today announced a series of technology innovations to the AttackIQ Informed Defense Architecture (AIDA).

Threat Model Thursday: Legible Architecture

Adam Shostack

What’s the legible architecture of a system? One of the advantages that cloud architectures bring is the opportunity to sweep away some of that historical complexity, and to create comprehensible models. That simplification carries value in terms of architectural consistency, makes it easier to impose checkpoints, and will be augmented over time with the accretion of complexity, inflexibility and eventually need to be swept away itself.

Containers require good architecture

InfoWorld on Security

Gartner is predicting growing container adoption by 2023, believe it or not. Are you sitting down? Data from its survey shows a surge in containerization of applications (and data).

What is 5G security? Explaining the security benefits and vulnerabilities of 5G architecture

CyberSecurity Insiders

Defining 5G security and architecture. Delving into the technical details of the 5G security architecture is beyond the scope of this article. Explaining the security benefits and vulnerabilities of 5G architecture appeared first on Cybersecurity Insiders.

Unique P2P Architecture Gives DDG Botnet ‘Unstoppable’ Status

Threatpost

Malware Web Security analysis cryptomining ddg botnet Monero netlab 360 P2P peer to peer unique architecture unstoppableDDG might be the world's first P2P-based cryptomining botnet.

Zero Trust Architecture &  Elements of Multi-Factor Authentication

Security Boulevard

The post Zero Trust Architecture & Elements of Multi-Factor Authentication first appeared on SecureFLO. The post Zero Trust Architecture & Elements of Multi-Factor Authentication appeared first on Security Boulevard.

Ericom Survey Shows Shift to Zero-Trust IT Architectures

Security Boulevard

The post Ericom Survey Shows Shift to Zero-Trust IT Architectures appeared first on Security Boulevard.

The Architectural Mirror (Threat Model Thursdays)

Adam Shostack

I last discussed this in “ Architectural Review and Threat Modeling “ ). A few weeks ago, I talked about “ reflective practice in threat modeling “, thinking about how we approach the problems we face, and asking if our approaches are the best we can do. Sometimes it’s hard to reflect. It’s hard to face the mirror and say ‘could I have done that better?’ ’ That’s human nature.

3 cloud architecture mistakes we all make, but shouldn’t

InfoWorld on Security

So, if mistakes are a natural byproduct of creating a good and innovative new architecture, then it’s time to look at the mistakes that are made most often. For cloud architectures, those mistakes should be understood by now and avoided.

Three Steps to Complete Your Zero Trust Architecture

Security Boulevard

But Zero Trust Architecture is incomplete without device firmware and hardware verification. The post Three Steps to Complete Your Zero Trust Architecture appeared first on Security Boulevard. Zero Trust is a critical strategy for defending our ever-growing digital attack surfaces.

Taking Steps Toward an Impactful SASE Architecture

Security Boulevard

The post Taking Steps Toward an Impactful SASE Architecture appeared first on Security Boulevard. Given the complexity of digitization initiatives for most companies over the last decade, the world has grown acutely aware of how crucial good cybersecurity is for business health.

Why Companies Do Need Enterprise Architecture at Downturn?

Doctor Chaos

Like a set of reference architectures, which in practice turn to be 80% different from architectures of previously deployed solutions or a […]. Written by Mike Oliver LinkedIn: https://www.linkedin.com/in/mikeolivero4bo Website: [link] Take it or leave it, but often EA is often referred to as a lengthy initiative with very unclear and practically not very applicable results.

Fuzz in Your Language, Fuzzer, or Architecture!

ForAllSecure

That’s why we’ve gone ahead and compiled a catalog of fuzz targets intended for Mayhem that’s written and compiled using several different languages (and architectures) like C/C++, Python, Go, Rust, Java and many others!

Hyperautomation and Cybersecurity – A Platform Approach to Telemetry Architectures

McAfee

The rise of telemetry architectures, combined with cloud adoption and data as the “new perimeter,” pose new challenges to cybersecurity operations. It all begins with the build-up of an appropriate telemetry architecture, and McAfee Enterprise’s billion-sensor global telemetry is unmatched.

Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures

CyberSecurity Insiders

The Bitglass SmartEdge SWG architecture uniquely addresses these concerns in several ways. The post Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures appeared first on Cybersecurity Insiders

What's Your Cybersecurity Architecture Integration Business Plan?

Dark Reading

To get the most out of your enterprise cybersecurity products, they need to work together. But getting those products talking to each other isn't easy

Collaboration is key to a secure web application architecture

Security Boulevard

TechTarget recently ran an interview with "Web Application Security" author Andrew Hoffman, who explained the importance of a secure web application architecture and how to achieve it through collaboration between software and security engineers.

Building a scalable RAVPN architecture in Oracle Cloud Infrastructure using Cisco Secure Firewall

Cisco Retail

With Cisco Secure Firewall, organizations are able to build a scalable RAVPN architecture on OCI, providing employees secure remote access to their organization’s resources from any location or endpoint. In this architecture, we have deployed multiple firewalls in multi-availability domains.

Creating a Defensible Security Architecture

Dark Reading

You'll be able to layer in multiple prevention and detection solutions and have a highly effective security architecture Take the time to learn about your assets.

Webinar featuring IDC’s Mark Leary: Make your IT operations future-proof with the Branch of One architecture

Security Boulevard

The post Webinar featuring IDC’s Mark Leary: Make your IT operations future-proof with the Branch of One architecture appeared first on ManageEngine Blog. At the start of the pandemic, IT organizations had to undergo radical changes to support remote work.

The Security Checklist for Designing Asset Management System Architectures

Heimadal Security

The post The Security Checklist for Designing Asset Management System Architectures appeared first on Heimdal Security Blog. In a previous article, I have broached the topic of Software Asset Management and how it consociates with IT Asset Management.

BrandPost: Network Security and the Heart of a Zero Trust Architecture

CSO Magazine

The heart of any Zero Trust Architecture (ZTA) is an authorization core involving equipment within the control plane of the network that determines this confidence and continually evaluates confidence for every request.

Anitian Named a Vendor in Gartner Hype Cycle for Enterprise Architecture

Security Boulevard

The post Anitian Named a Vendor in Gartner Hype Cycle for Enterprise Architecture appeared first on Anitian. The post Anitian Named a Vendor in Gartner Hype Cycle for Enterprise Architecture appeared first on Security Boulevard.

Finding Beauty In The Architecture

Threatpost

A good appreciation and respect for good real-world architecture goes a long way when it comes to architecting resilient systems. Hacks InfoSec Insider Web Security AWS Comcast customer premise equipment datacenter DDoS Global Traffic Management load balancers

Threat Model Thursday: Architectural Review and Threat Modeling

Adam Shostack

For Threat Model Thursday, I want to use current events here in Seattle as a prism through which we can look at technology architecture review. Let’s transition from the housing crisis here in Seattle to the architecture crisis that we face in technology. The meeting took not five whole minutes to go off the rails with suggestions about non-cryptographic architecture.

Where to Find Security Holes in Serverless Architecture

Dark Reading

Serverless architectures take away business responsibility for server management, but security should still be top of mind

“Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works.

Security Boulevard

To echo a famous Russian proverb, "trust but verify," it's not enough to implement a zero trust architecture. It’s not enough to deploy a zero trust architecture. It’s not enough to deploy a zero trust architecture.

3 cloud architecture secrets your cloud provider won’t tell you

InfoWorld on Security

Do you have an optimized architecture? So, here are three cloud architecture secrets that you’ll never hear from your cloud provider: To read this article in full, please click hereThis means that your solution maximizes efficiency and minimizes costs.

The Theory and Motive Behind Active/Active Multi-Region Architectures

Security Boulevard

The post The Theory and Motive Behind Active/Active Multi-Region Architectures appeared first on Security Boulevard. The date was 24th December 2012, Christmas eve. The world’s largest video streaming service, Netflix experienced one of its worst incidents in company history.

Fairhair Alliance Building IoT Security Architecture

Dark Reading

A group of companies in the building automation and IoT space is working for a coherent security architecture that incorporates multiple standards