top of page
Search


Comprehensive Security Architecture Review (CSAR): Empowering Security Architects
Security Architects face unprecedented challenges in safeguarding their organizations against sophisticated threats. The increasing...


Aspiring to Architect: The Journey of a Senior Security Engineer
For many senior security engineers, the aspiration to become a security architect is driven by a deep-seated passion for shaping the...


Executive Strategies for Embedding Security-by-Design
Don't let the power suits and executive titles fool you – the leaders championing security-by-design initiatives are more than just...


A Strategic Blueprint for Security Self-Project Management
ISAUnited has heard from its members that there are growing numbers of self-project management duties due to a lack of PMO guidance...


Security Controls: Building Trust, One Control at a Time
Adopting to developing and maintaining security standards, security practitioners rely heavily on security control sets to safeguard...


Introducing ISAUnited's new Security Design Operations (SDO) framework
Implementing SDO: Streamlining Security Architecture Design Introducing ISAUnited's new Security Design Operations framework, our...


Attack Surface Analysis in Security-by-Design
ISAUnited has recently unveiled its latest Security Standard, dedicated to protecting your organizations attack surface. This new...


ISAUnited incorporates Threat Intelligence into its Defensible Architecture Design Methodology.
Analyzing threats effectively and efficiently during the design phase of security architecture is essential. ISAUnited's new directive...


Strengthening Defenses: Threat Maps as Essential Tools in Threat Modeling and Risk Reporting
Security architects are integral to fortifying an organization's defenses against cyber threats, with the creation of security threat...


Security Tool Lifecycle-Calibration and Maintenance in Security Engineering
Security engineering relies on various vendor-provided tools to fortify an organization's digital defenses. While trust in these tools is...


The Security Architect's Role in Centers of Excellence and Technical Design Authorities
While both a Center of Excellence (CoE) and a Technical Design Authority (TDA) are organizational concepts aimed at improving and...


Leveraging Vendor Security Reference Architecture in Security-by-Design
Vendor security reference architecture and models are frameworks provided by technology vendors to guide organizations in designing and...


The Alignment of Security Architecture with NIST and ISO Standards
In the ever-evolving landscape of cybersecurity, organizations worldwide are recognizing the importance of adopting robust security...


Navigating the Dual Role: Security Architects as Designers and Engineering Managers
Today security architects are seen and treated as leaders. As a security architect, you may possibly run into situations in which you may...


Security Engineering Steps in the Security-by-Design Process
In security architecture, engineers play a crucial part in the security-by-design process. In most cases, security engineers are...


Career Paths to Becoming a Security Architect
Introduction Security architects play a vital role in strengthening networks and computer security. Specifically, they are responsible...


Who is a Security Architect
Introduction A Security Architect plays a crucial role in society since he/she is responsible for designing and putting security systems...


Everything you need to know about The State & Local Cybersecurity Grant Program for 2022
State and local governments encounter almost the same amount of cybersecurity incidents as any other industry. In 2020, federal agencies...


15 Security Design Principles You Need to know!
Technology today is ever evolving, hackers on the other hand are also busy at work developing cutting-edge ways to nullify cybersecurity....


The Time to add a Security Architect.
When do you need a Security Architect? In the expanding tech world of today, a security architect is often overlooked or seen as a...

Join ISAUnited for the professional support and growth that you won't find anywhere else
ISA United gives you the best professional and technical resources.
bottom of page