Adopting a Zero Trust approach is the best strategy to control access

Discussion in 'other security issues & news' started by Minimalist, Jul 25, 2018.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    12,403
    Location:
    Here
    https://www.helpnetsecurity.com/2018/07/25/zero-trust-approach/
     
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    12,403
    Location:
    Here
    IBM's 2018 Data Breach Study Shows Why We're In A Zero Trust World Now
    https://www.forbes.com/sites/louisc...tudy-shows-why-were-in-a-zero-trust-world-now
     
  3. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    12,403
    Location:
    Here
    Zero-Trust Frameworks: Securing the Digital Transformation
    https://threatpost.com/zero-trust-frameworks-securing-the-digital-transformation/
     
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    12,403
    Location:
    Here
    Zero trust browsing: Protect your organization from its own users
    https://www.helpnetsecurity.com/2019/02/11/zero-trust-browsing/
     
  5. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    12,403
    Location:
    Here
  6. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    8,956
    For sure, trust is often what gets one pwned ;)
     
  7. mood

    mood Updates Team

    Joined:
    Oct 27, 2012
    Posts:
    19,852
    Debunking 5 Myths About Zero Trust Security
    March 7, 2019
    https://www.darkreading.com/cloud/debunking-5-myths-about-zero-trust-security/a/d-id/1334064
     
  8. mood

    mood Updates Team

    Joined:
    Oct 27, 2012
    Posts:
    19,852
    5 Ways To Demystify Zero Trust Security
    March 19, 2019
    https://incyberdefense.com/news/5-ways-to-demystify-zero-trust-security/
     
  9. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    12,403
    Location:
    Here
    Rules-Based Policy Approaches Need to Go
    https://threatpost.com/rules-based-policy-zero-trust/
     
  10. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    12,403
    Location:
    Here
    Enterprises Showing Increasing Backing of Zero Trust Authentication
    https://www.securityweek.com/enterprises-showing-increasing-backing-zero-trust-authentication
     
  11. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    12,403
    Location:
    Here
  12. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    12,403
    Location:
    Here
    What’s a Next Generation VPN with Zero-Trust Access?
    https://www.infosecurity-magazine.com/opinions/vpn-zero-trust/
     
  13. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    12,403
    Location:
    Here
    3 Benefits of Zero Trust to Customer Information Security
    https://hackernoon.com/3-benefits-of-zero-trust-to-customer-information-security-7c1dd48of
     
  14. mood

    mood Updates Team

    Joined:
    Oct 27, 2012
    Posts:
    19,852
    The zero trust model explained
    September 4, 2019
    https://www.scmagazine.com/home/opinion/executive-insight/the-zero-trust-model-explained/
     
Loading...
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.