Over the last nine months, we’ve seen unprecedented growth in the number of corporate employees working away from the office. Many rely on VPNs for connectivity; IT Security and Network Ops trust the Virtual Private Networks with their cadre of external and internal...
It makes more sense when you understand the role of “Dynamic Enforcement” Last week I came across another article educating readers on the advent of Zero Trust architecture (ZTA) and how it represents a new paradigm for securing critical applications and data...
David Linthicum is an internationally recognized authority on cloud complexity and security. He regularly and accurately reports on trends and challenges faced by the enterprise as it attempts to tap into the economic and performance benefits of moving workloads to...
Have you been hearing about Software-Defined Perimeters (SDP) and wondering what all the fuss is about? Are you reading about Zero Trust as the next great security paradigm but wondering if any organization has successfully implemented a zero trust model? On October...
Zero Trust has entered the marketing lexicon. Companies are adding “zero trust” to their library of SEO terms giving you a sense that “everybody has one” – whatever that “one” might be. No one disputes the potential benefits of the zero trust message – deny-all,...