top of page
Search


Attack Surface Analysis in Security-by-Design
ISAUnited has recently unveiled its latest Security Standard, dedicated to protecting your organizations attack surface. This new...


ISAUnited incorporates Threat Intelligence into its Defensible Architecture Design Methodology.
Analyzing threats effectively and efficiently during the design phase of security architecture is essential. ISAUnited's new directive...

Strengthening Defenses: Threat Maps as Essential Tools in Threat Modeling and Risk Reporting
Security architects are integral to fortifying an organization's defenses against cyber threats, with the creation of security threat...

Security Tool Lifecycle-Calibration and Maintenance in Security Engineering
Security engineering relies on various vendor-provided tools to fortify an organization's digital defenses. While trust in these tools is...

The Security Architect's Role in Centers of Excellence and Technical Design Authorities
While both a Center of Excellence (CoE) and a Technical Design Authority (TDA) are organizational concepts aimed at improving and...

Leveraging Vendor Security Reference Architecture in Security-by-Design
Vendor security reference architecture and models are frameworks provided by technology vendors to guide organizations in designing and...

The Alignment of Security Architecture with NIST and ISO Standards
In the ever-evolving landscape of cybersecurity, organizations worldwide are recognizing the importance of adopting robust security...

Navigating the Dual Role: Security Architects as Designers and Engineering Managers
Today security architects are seen and treated as leaders. As a security architect, you may possibly run into situations in which you may...

Security Engineering Steps in the Security-by-Design Process
In security architecture, engineers play a crucial part in the security-by-design process. In most cases, security engineers are...


Career Paths to Becoming a Security Architect
Introduction Security architects play a vital role in strengthening networks and computer security. Specifically, they are responsible...


Who is a Security Architect
Introduction A Security Architect plays a crucial role in society since he/she is responsible for designing and putting security systems...


Everything you need to know about The State & Local Cybersecurity Grant Program for 2022
State and local governments encounter almost the same amount of cybersecurity incidents as any other industry. In 2020, federal agencies...

15 Security Design Principles You Need to know!
Technology today is ever evolving, hackers on the other hand are also busy at work developing cutting-edge ways to nullify cybersecurity....


The Time to add a Security Architect.
When do you need a Security Architect? In the expanding tech world of today, a security architect is often overlooked or seen as a...

My response to the war in Ukraine
I wanted to share with our community that I and ISAU are united with the people in Ukraine and the international community in condemning...

Russia unleashed data-wiper malware
Russia launched a cyber assault alongside its military campaign Russia was widely expected to launch a cyber assault alongside its...

Top Threat Vectors for 2021
2021 has been an interesting year. It felt like a wannabe 2020 to be honest, trying to reiterate the experience from its predecessor....

Cyberattacks by Russia
7 Steps to Take Right Now to Prepare Many expect the attacks to run the gamut from destructive campaigns involving the use of disk-wipers...

Executive Order on Improving the Nation’s Cybersecurity
On May 12, 2021, President Biden released the “Executive Order on Improving the Nation’s Cybersecurity.” The executive order followed a...

Join ISAUnited for the professional support and growth that you won't find anywhere else
ISA United gives you the best professional and technical resources.
bottom of page