How do we unify identity access management and directory services? This post explores the origins of Identity-as-a-Service and introduces the security gaps created by the proliferation of remote workers. Continue reading
Public Cloud Security
The Zero Trust Maturity Model
In the final post of the Zero Trust series, we look at the Zero Trust Maturity Model as a roadmap to full deployment in alignment with the NIST tenets.Continue reading
The core principles of Zero Trust — The Open Group
The Open Group outlines the principles of Zero Trust and aligns them to a business use case. Understanding these principles will help you communicate the Zero Trust concept using the language of the business driver.Continue reading
Establishing trust with Zero Trust
Bring your own device (BYOD) policies are a great example of deperimeterization and the principles of Zero Trust.Continue reading
What is Zero Trust?
Zero Trust security is the best way to protect your networks, data, applications, and employees. Why is there so much resistance?Continue reading
CSA identifies top 11 cloud security impediments
Cloud security is a significant concern, but organizations continue to deploy cloud workloads without including security in the development process.Continue reading
CTO Fleming Shi on the importance of cybersecurity champions
Barracuda CTO Fleming Shi joins CyberWire Daily to discuss the need for cybersecurity champions on project and development teams.Continue reading
How Zero Trust can simplify ETL, and make AI and ML a reality for customers
Artificial Intelligence (AI) and Machine Learning (ML) are transforming business practices – but only when organizations overcome data aggregation challenges.Continue reading