Zero Trust

February 4, 2019

SECURITY

Protecting Cisco AnyConnect VPN & Cloud Applications With Duo’s MFA

Adding Duo’s multi-factor authentication (MFA) to VPN solutions, like Cisco AnyConnect, enables secure access to all applications. This is the first in a three-part series.

January 25, 2019

SECURITY

New Year, Same Reality: How Much Will Security Actually Change in 2019

The union of Cisco and Duo Security in 2018 means that IT and security teams have a comprehensive solution to address the challenges heading into 2019.

January 14, 2019

SECURITY

Forrester’s Zero Trust or Gartner’s Lean Trust?

Whether you tell your boardroom that you’re going to adopt zero trust or lean trust, you need to decide how and where to start your multi-year journey. This blog explores 2 common approaches to zero trust, Forrester's Zero Trust eXtented (ZTX) and Gartner's CARTA approach, and how Cisco can help you on your journey to better trust-centric security.

January 8, 2019

SECURITY

Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach

The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called CARTA. These trust-centric approaches shift access decisions based on network topology to authorized users and devices. In this blog we will explore what you should consider when moving to a Zero Trust framework and how to get started.

December 11, 2018

SECURITY

Know Your Boundaries To Know your Strategy

Where are the boundaries for threats to your operational systems? Has your organization initiated a risk assessment and created a threat model that would have covered some of the following...

November 7, 2018

SECURITY

Protecting Critical Infrastructure Networks with Zero Trust Segmentation

Critical infrastructure providers are increasingly implementing IoT systems to support, augment, or update their already networked  operational technology.  Further, critical infrastructure is often managed and deployed over connected systems supported...

August 25, 2018

SECURITY

Why Organizations With Sensitive Research or Intellectual Property Need a Zero Trust Cybersecurity Framework Approach

With Zero Trust moving you away from the perimeter security approach towards a framework protecting sensitive data, it opens up a number of situations...

July 18, 2018

SECURITY

Moving Towards The Zero Trust Cybersecurity Framework?

The first step should be an investigation and analysis of what your sensitive data is, where it lives, and who accesses it. Then analyze the three Foundational Pillars (see...

June 5, 2018

SECURITY

Why has Forrester’s Zero Trust Cybersecurity Framework become such a hot topic?

Let’s focus on the Zero Trust approach first. If your infrastructure was on the Internet how would you design your organization’s cybersecurity framework? Authentication to confirm who logs into...