Friction is the enemy of cybersecurity. Tools and approaches that make it more difficult for users to do their jobs turn security solutions into impediments, digital stop signs in an era when business leaders are demanding agility. For organizations implementing a Zero Trust approach, the subject of user experience should not be far from mind….
Archives
-
Identity-Centric Security: 10 Data Points from 10 Different Vendors (and a book) Make the Case
There’s almost universal consensus that perimeter-centric security is insufficient for today’s distributed IT environments. But where debate amongst IT pros and vendors now rages is whether the optimal enterprise security approach today is application-centric, data-centric, or identity-centric. Data-centric and application-centric approaches have merit, but each can be undermined simply by the wrong identity accessing data,…
-
Zero Trust Myth Series: Zero Trust is about Secure Access, Not Zero Access
Say the term Zero Trust, and there will be those that take the word zero to mean exactly that-zero, as in no trust at all. In reality, Zero Trust is about acknowledging that bad actors will make their way into an organization’s environment and building defenses with that idea in mind. This confusion is the…
-
Guest Blog: A Community Vision, A Team Game Approach and a Call to Action for Tomorrow’s CISOs
We recently sat down with Adam Bosnian, Identity Defined Security Alliance (IDSA) executive advisory board member and EVP of global business development at CyberArk, to discuss the importance of collaborative, identity-centric security and the evolving role of the CISO in the digital transformation age. Here’s a summary of what he had to say: Can you describe how…
-
Healthcare CISOs Push the Importance of Identity
Last week H-ISAC, a trusted community of critical infrastructure owners and operators within the Health Care and Public Health sector (HPH), published a new paper titled “Identity for the CISO Not Yet Paying Attention to Identity.” The paper, authored by a technical working group of healthcare CISOs, is the first in a series focused on…
-
Zero Trust in the Identity-Defined World
The Origins of Zero Trust The Zero Trust model was established in 2010 by Forrester analyst John Kindervag and has enjoyed a fascinating and somewhat tumultuous 10-year history. It was born out of a period of increased and sustained breach activity combined with a growing frustration that existing security approaches were falling short of addressing…