In the final post of the Zero Trust series, we look at the Zero Trust Maturity Model as a roadmap to full deployment in alignment with the NIST tenets.Continue reading
Data Protection
The core principles of Zero Trust — The Open Group
The Open Group outlines the principles of Zero Trust and aligns them to a business use case. Understanding these principles will help you communicate the Zero Trust concept using the language of the business driver.Continue reading
Ransomware payment debate intensifies
Will a government ban on ransom payments reduce ransomware attacks? Not if the FBI analysis is correct.Continue reading
Why automated data backups still need to be managed
There are real risks to taking too hands-off an approach to managing your powerful new backup solution.Continue reading
4 tips that will help you protect customer data for your business
Data breaches cost your business time and money. Here are four tips to help you protect your data and your customers' trust.Continue reading
Anti-ransomware must-haves: Immutable backups and air-gap security
See why two of the most important capabilities for combating ransomware are immutable backups and air-gap security for cloud storage.Continue reading
Ransomware attack disrupts reporting process at Oregon Secretary of State
A ransomware attack on a web hosting service provider has been problematic for several organizations, including the Oregon Secretary of State.Continue reading
The most dangerous phish in the sea
See why ice phishing (internal communication emulation) is one of the most successful types of phishing attacks.Continue reading