Archives

  1. Going back to Zero: A Primer on Zero Trust

    We are here to talk about going back to Zero!!! Today’s enterprises are home to hundreds of applications that are critical to their core business. However, a paradigm shift in the landscape of Information Technology due to cloud adoption, remote workforce, and mobility has forced organizations to rethink their security approach to keep bad actors…

  2. Making Sense of Zero Trust: Perspectives from Inside and Outside Government Organizations

  3. Does the Presidential Executive Order Reinforce Zero Trust and Identity Defined Security?

    In May, US President Joe Biden’s executive order on cybersecurity marked the launch of an ambitious, in-depth approach to improving the digital defenses of the federal government in the wake of multiple sophisticated attacks on the public and private sector. Biden’s order covered significant ground, including strengthening software supply chain security and implementing data encryption. But what…

  4. How a ‘Zero-Trust’ Approach Enables Healthcare Organizations to Improve Security

  5. Authentication Requirements for the Presidential Executive Order

  6. Adopting Zero Trust in a Post-Pandemic World

  7. Beyond Humans: Zero Trust and Machine Identities

    Today’s economic climate exacerbates these cyber risks and the impact of the COVID-19 epidemic has led to an acceleration in digital transformation and technical change that will further stress-test organizations’ identity and access management practices. This creates new challenges in minimizing access-related risks across traditional datacenters, cloud, and DevOps environments. Companies that have adopted an…

  8. NIST SP 800-207 – Zero Trust Architecture – Finalized with More Emphasis on Identity

    Last week, the National Institute of Standards and Technology (NIST) published its guidance for implementing a Zero Trust architecture, SP 800-207. This latest publication consolidates industry input received on previous draft versions of the architecture. As part of IDSA’s mission to promote identity-centric security, we provided feedback to NIST and are pleased to see some of our recommendations…

  9. BYO[D] Doesn’t Have to Mean Bring Your Own [Vulnerability]

    The Bring-Your-Own-Device (BYOD) model of operating has been a double-edged sword for IT professionals. On the one hand, it empowers and allows for business productivity. On the other hand, it continues to create a serious challenge for organizations as IT and security professionals find ways to enforce access control across a diverse ecosystem of mobile…

  10. Customer Advisory Board Conversations: Zero Trust and the Remote Workforce

    Until the last 45 days, an organization’s industry, company culture and the role of an individual were the primary drivers behind remote working policies. However, recently we’ve seen an unprecedented shift to remote working due to the concerns over Covid-19. For some organizations it’s been relatively uneventful, for others it has been a monumental change…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.