Remove Architecture Remove Book Remove Risk
article thumbnail

Review: Practical Cybersecurity Architecture

Adam Shostack

Adam Shostack's review of the book Practical Cybersecurity Architecture There's an insightful comment , "Everybody has a testing environment. Similarly, everybody has both enterprise and product architecture. Importantly, the book is short, readable and grounded, and I've learned a lot reading it.

article thumbnail

Review: Practical Security Architecture

Adam Shostack

” Similarly, everybody has both enterprise and product architecture. I have to say that because “architecture” is much maligned for being heavyweight, disconnected, and irrelevant in today’s world of Dev-Opsy CI/CD moving fast and breaking things. They say nice things about my Threat Modeling book.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Seraphic launches BrowserTotal™ — a free AI-powered tool to stress test browser security

The Last Watchdog

The launch coincides with the Gartner Security & Risk Management Summit 2025, where Seraphic will be showcasing the new platform with live demos at booth #1257. ” Attendees of the Gartner Security & Risk Management Summit 2025 can experience Browser Total firsthand at booth #1257.

Marketing 130
article thumbnail

ISACA impressions: AI, risk and resilience feature at the 2025 conference

BH Consulting

Dr. Ng emphasised the balancing act between innovation and risk. Cloud calls for cooperation in a changed risk landscape Has computing really changed with the cloud? Although the core architecture hasnt shifted drastically, he said the risk landscape has.

Risk 59
article thumbnail

NBlog Mar 11 - book review on "Cyber Strategy"

Notice Bored

Cyber Strategy Risk-driven Security and Resiliency Authors: Carol A. Siegel and Mark Sweeney Publisher: Auerbach/CRC Press ISBN: 978-0-367-45817-1 Price: ~ US$100 + shipping from Amazon Outline This book lays out a systematic process for developing corporate strategy in the area of cyber (meaning IT) security and resilience.

article thumbnail

Secure Your Business With Cisco Hybrid Mesh Firewall Solutions

Cisco Security

At the same time, AI tools are becoming an essential part of how you work, bringing both opportunities and potential risks. Cisco Secure Firewall Cisco Secure Firewall acts as the foundation of your security architecture. Cisco AI Defense AI tools can be game changers for productivity, but they also come with risks.

article thumbnail

Information risk and security for professional services

Notice Bored

When you acquire or provide professional services, how do you address the associated information risks? In theory, clients and providers should proactively identify, evaluate and address information risks relating to or arising from professional services in order to avoid, reduce or limit the damage arising from such incidents.

Risk 72