This blog was originally published by 909Cyber here. Between 2017 and 2022 I was fortunate to be the leader responsible for the strategy and execution of Zero Trust initiatives at Adobe and Cisco. In my role of running enterprise Security for both companies (of course not at the same time). As the executive leading…
Archives
-
Mastering Financial Services Compliance With IAM and PAM
This blog was originally published by Bravura here. Managing data access is an ongoing journey for businesses in the financial services industry. Policies such as the Sarbanes-Oxley (SOX) Act and the Gramm-Leach-Bliley Act (GLBA) establish regulations that your business must follow when implementing any identity access management (IAM) or privileged access management (PAM) tool. Auditors will check your system for compliance…
-
4 Mindset Shifts for Making Zero Trust Work in the Real World
This blog was originally published by Cerby here. Zero Trust has become one of the cybersecurity world’s most misunderstood buzzwords. In theory, it’s simple: never trust, always verify. In practice, it’s often reduced to a check-the-box product deployment or a single vendor’s promise to “solve” it for you. But Zero Trust is not something you…
-
Disconnected Apps: The Gap in Your Zero Trust Strategy
Zero trust (ZT) works when deployed consistently, but you can’t apply it to apps that are disconnected from your identity infrastructure. When we think of enterprise apps, we often focus on major SaaS apps like M365 and SalesForce. However, countless disconnected apps lurk in the background, posing significant risks to your organization. What Are disconnected…
-
Building Zero Trust Security Posture for Secure Privileged Access Management Journey
This blog was originally posted by Arcon on their blog page. You can read the original here. Overview Today, we are experiencing a growing assortment of applications, systems, APIs, and data that is scattered across IT networks in distributed IT infrastructure and multi-cloud environments. This assortment of critical information is constantly at risk from unauthorized…
-
How Modern IGA Supports the Zero Trust Security Model
By now, everyone is familiar with the Zero-Trust security model. The main concept behind Zero-Trust is “never trust, always verify.” This means that users and devices should not be trusted by default, even if they are connected to a permissioned network or previously verified. The principle of least privilege within a modern identity governance solution…