De-identification, Data Security and Testing with Production Data
While we know that software can expose data, we sometimes forget that writing software can expose data. When a system…
Guiding Enterprise Change
While we know that software can expose data, we sometimes forget that writing software can expose data. When a system…
What should an Enterprise Architect know about threat modeling? I recently asked on a LinkedIn group about threat modeling and…
We all know that Google lost a landmark legal case recently. As of now, a citizen of Europe has the…
One challenge with long-running news stories is that it is often difficult to keep track of the “current” bits. Even…