Archives

  1. Zero Trust Myth Series: Going Beyond the Network

    First impressions die hard. When the concept of Zero Trust was first introduced, the focus was on segmenting, isolating, and controlling network traffic. Today, however, those ideas represent only one fraction of a Zero Trust strategy. On my list of Zero Trust myths, the second fallacy I noted was the idea that Zero Trust focuses solely on…

  2. Zero Trust Myth Series: What’s Old is New Again, with a Twist

    There was a time when defending the perimeter was the focus of IT security. By necessity, those days have long passed. Between insider threats, credential-stealing malware, and social engineering, today’s businesses need to secure more than the gate around the castle. They must defend the doors inside the castle itself. This reality has brought Zero…

  3. Identity Defined Security Alliance Publishes New Guidance on Zero Trust

    Alliance to share vision for changing security paradigm, and how putting identity at the center will help organizations leverage existing investments while reducing risk, at Black Hat USA 2019 DENVER, July 24, 2019 — The Identity Defined Security Alliance (IDSA), an industry alliance that helps organizations leverage existing cybersecurity investments to establish a stronger security posture, today…

  4. LogRhythm’s Journey to Identity-Centric Zero Trust

    The original Zero Trust model was developed by Forrester in 2010, but not fully embraced until Google successfully developed and implemented their version of Zero Trust, Beyond Corp, almost six years later. Let’s explore what exactly the Zero Trust model is and what it means to implement one. This shifts away from the large, corporate perimeters, with layered-in…

  5. Zero Trust in the Identity-Defined World

    The Origins of Zero Trust The Zero Trust model was established in 2010 by Forrester analyst John Kindervag and has enjoyed a fascinating and somewhat tumultuous 10-year history. It was born out of a period of increased and sustained breach activity combined with a growing frustration that existing security approaches were falling short of addressing…

  6. Customer Advisory Board Conversations: Adobe’s Den Jones on Integrations

    In this blog series, we’ll be providing the perspective of our Customer Advisory Board members on topics that are important to the identity and security vendor and practitioner community as we create frameworks and build products to help organizations successfully implement identity-centric security.  If you have topics or questions that you would like us to…

  7. Controlling Identity with the Endpoint

    The year is 2019 and if you’re like most of us, you’re seemingly gravitating closer and closer to all things ‘aaS’. Software, Identity, Infrastructure, Access Management, Integration – you name it and there’s a similar (if not superior) version of a core business service available in the cloud. While this shift has resulted in an…

  8. September 26th Webcast: The Case for Identity Centric Security – Adobe’s Path to ZEN

    Join us for our first ever live IDSA Webcast on September 26th, 2018 at 11:30am MT. Join Adobe’s Den Jones, Director of Enterprise Security, and Carlos Martinez, Sr. Systems Engineer, to hear how they overcame the struggle to find the balance between a pleasant user experience and stringent security requirements through a Zero-trust Enterprise Network…

  9. Optiv: Integrating IAM and Cyber Security Tools for a Zero Trust Approach

    Over the past few years traditional security techniques, like perimeter-based security, have not managed to prevent security breaches. Breaches continue to rise despite bigger and better network security devices. So what has caused some of these breaches? Specifically, employee negligence or loss, insider threats, hacking and data mobility across devices are all leading causes. However,…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.