The article informs about the evolution of information security architecture, from focusing on attributes like integrity and confidentiality to charting access paths to data. Topics include the challenges faced with centralized controls in distributed systems, the emergence of frameworks like TOGAF and SABSA, and the need for more effective and less complex approaches in architecting information security.