OSA Reborn: Modern Platform, Same Mission
After 17 years of serving the security architecture community, Open Security Architecture has a new home.
Updates, insights, and commentary from the OSA community. Tracking the evolution of security architecture since 2008.
After 17 years of serving the security architecture community, Open Security Architecture has a new home.
One of the OSA team has kindly spent some time updating the CMS template, and modernising the look. It's a holding pattern but it means the site stays supported a bit longer, while we figure out some new content.
Quick update. It has been a long time since the core team provided any significant updates for OSA. We are still interested in developing the ideas in this project and have been discussing moving to a modern platform and workflow.
OSA has an updated template and new CMS thanks to Chris. We have plans for a secure data centre pattern shortly, and will be refreshing the site structure and content in the coming months. Stay tuned.
Just read a great article on Ars Technica covering a 1970 DoD analysis of computer system vulnerabilities...
Just to let you know that we are still alive and this project has not died. We have some new ideas to reinvigorate...
We are still here (thanks to those of you who've written to check)....however the core team have been busy on other projects (and their day jobs)....which all in all has meant slow progress.
We've added a new icon to the 13_02 set for an upcoming PCI pattern. We now have a White Hat to represent an ethical 'hacker' (I place it in quotes as the term originally meant computer user who hacked together code quickly to achieve a given objective, and has somewhat changed meaning in recent years), a.k.a Pen Tester.
When we founded OSA a few years back it seemed likely that we would soon inhabit a world where IT Security and the management of IT Risks would be a crucial part of the equation to ensure that our society and it's industrial, commercial and economic systems functioned effectively. There was already a strong case for ensuring that computing architectures were secure for financial services but it was less clear on the importance of security for Industrial Control Systems, or the need to ensure that social networking and information providers maintained high levels of integrity.
There have been a remarkable number of news items lately on hacking operations uncovered at large organisations that have exfiltrated significant volumes of data and gone undetected for 6 months plus. The QinetiQ example that Wired mention is typical of the breed.