Professionally Evil Fundamentals: Introduction

A Hacker’s Tour of the X86 CPU Architecture

Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, laptops, and servers.  While other architectures exist and are even taking some market share with mobile ...
Polyscale-1

The Importance of Uptime and Performance in Cloud Security

Imagine that you just purchased a brand new car featuring all of the latest bells and whistles. You're excited to take advantage of speed camera detection and try out the heated seat ...
Pretty young lady taking a decision with scale above her head

Six Key Characteristics of a Modern Secure Web Gateway

As we head into the second quarter of 2021 and mark a full year of remote work for many organizations, it is clear that the COVID-19 pandemic has accelerated digital transformation globally ...

Zero Trust Architecture: What is NIST SP 800-207 all about?

“Doubt is an unpleasant condition, but certainty is an absurd one.” Whilst I claim no particular knowledge of the eighteenth-century philosopher Voltaire, the quote above (which I admit to randomly stumbling upon ...
:-(

Security Architecture Frameworks – Yay or Nay?

| | architecture, security
This post is about a topic that few of us ponder often: security architecture frameworks. We have some exciting research plans in this area, hence this blog series. Perhaps one can say ...
sec-arch-book

In 2018, What Is Security Architecture?

| | architecture, security
Summer is a less busy time here in terms of client calls [hey … you can book an analyst call for tomorrow … even with me :-)], so we get more time ...
Ben-matrix.png

The Quest for Optimal Security

There's no shortage of guidance available today about how to structure, build, and run a security program. Most guidance comes from a standpoint of inherent bias, whether it be to promote a ...