Addressing What Should Be Your Highest Security Concern - Coding
We hear about new breaches into our computer network and systems. And who knows what we are not hearing about!
The reactions are always the same: it’s the opposition political party, it’s foreign governments, it’s “professional hackers”, it’s our competitors, it’s, it’s, it’s them!
Perhaps instead of looking outside for the culprit and at the symptom, it is time to look in the mirror, and at the cause.
Categories
- Agility
- Architecture Models
- Architecture Views
- Artificial Intelligence
- Assemble to Order
- BTP
- Benefits
- Big Data
- Bill of Materials
- Book
- Business Architect
- Business Architecture
- Business Architecture Framework
- Business Architecture Participants
- Business Architecture Tools
- Business Capability
- Capabilities
- Capability Ability
- Certification
- Certification Levels
- Certification Mistakes
- Change Management
- Checklist
- Cloud
- Cloud Decommission
- Coding
- Communication
- Competition
- Complexity
- Confirmation Bias
- Consulting
- Cybersecurity
- Data
- Data Architecture
- Data Lake
- Data Modeling
- Data Sludge
- Data Swamp
- Differentiators
- Digital Transformation
- Distance Learning
- Enterprise Architect
- Enterprise Architecture
- Enterprise Architecture Framework
- Enterprise Architecture Participants
- Enterprise Architecture Tools
- Evaluation Checklist
- Evaluation Criteria
- Event Model
- Experiences needed