Articles
Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach
3 min read
The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called CARTA. These trust-centric approaches shift access decisions based on network topology to authorized users and devices. In this blog we will explore what you should consider when moving to a Zero Trust framework and how to get started.
Why Organizations With Sensitive Research or Intellectual Property Need a Zero Trust Cybersecurity Framework Approach
2 min read
With Zero Trust moving you away from the perimeter security approach towards a framework protecting sensitive data, it opens up a number of situations...
Moving Towards The Zero Trust Cybersecurity Framework?
2 min read
The first step should be an investigation and analysis of what your sensitive data is, where it lives, and who accesses it. Then analyze the three Foundational Pillars (see...
Reducing the Attack Surface: Takeaways from the 2015 Annual Security Report
3 min read
As the Cisco 2015 Annual Security Report shows, current security approaches aren’t sufficient. Attackers are shifting methods and becoming more sophisticated in their approaches, users are unwittingly complicit enablers, and defenders struggle to keep up with all of these things. It is time for defenders to take a different approach to security that not only […]
4