What can we learn from people who develop title sequences which start our favorite television shows? And what does good look like, for starting projects?
Watch more videos on my YouTube channel.
What can we learn from people who develop title sequences which start our favorite television shows? And what does good look like, for starting projects?
Watch more videos on my YouTube channel.
Considerations when implementing password resets. What factors do you verify the person with?
Watch more videos on my YouTube channel.
An ongoing attack has wiped data on more than 15,000 ElasticSearch servers. That’s about a third of all the Internet-facing ElasticSearch instances. Good time to review how to secure this resource.
Watch more videos on my YouTube channel.
IT security leaders envision future security capabilities. Capabilities like Identity and Access Management or Threat and Vulnerability Management. Capabilities which enable the organization while disabling the attackers, built upon processes and technology. But there’s a problem. The technologies change. The threats change. Putting aside those change, we have to acknowledge that people aren’t adept at predicting the future. How do we design for the unknown while embracing our shortcomings?
By taking a page from Joe Colombo’s book. Colombo designed a series of futuristic rooms and furniture. The main goal of his design was variability. Each piece was versatile and modular. The overall room was reconfigurable and adaptable. “My design experiences try to create an evolutionary link between current reality and future,” is how Colombo described it. Evolution favors flexibility. As it is in biology, so too in technology.
When deciding between two options, choose the one with the greater variability. This increases the possibilities for handling future threats or technologies. We won’t always get it right. Take just technology. One of Colombo’s pieces couldn’t be produced until the plastics industry caught up. It took nearly 50 years, with the 4801 Armchair finally reaching production in 2011. That said, it’s better to have an unused possibility than have a need that the design can’t meet. To future-proof a security capability, design for versatility.
This article is part of a series on designing cyber security capabilities. To see other articles in the series, including a full list of design principles, click here.
The architect Robert AM Stern once said, “architects don’t copy, they quote.” Perhaps our problem is when we copy best practices. So here’s a way to quote when designing a security capability.
Watch more videos on my YouTube channel.