Adopting a Zero Trust approach is the best strategy to control access

Discussion in 'other security issues & news' started by Minimalist, Jul 25, 2018.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    https://www.helpnetsecurity.com/2018/07/25/zero-trust-approach/
     
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    IBM's 2018 Data Breach Study Shows Why We're In A Zero Trust World Now
    https://www.forbes.com/sites/louisc...tudy-shows-why-were-in-a-zero-trust-world-now
     
  3. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    Zero-Trust Frameworks: Securing the Digital Transformation
    https://threatpost.com/zero-trust-frameworks-securing-the-digital-transformation/
     
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    Zero trust browsing: Protect your organization from its own users
    https://www.helpnetsecurity.com/2019/02/11/zero-trust-browsing/
     
  5. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
  6. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    For sure, trust is often what gets one pwned ;)
     
  7. guest

    guest Guest

    Debunking 5 Myths About Zero Trust Security
    March 7, 2019
    https://www.darkreading.com/cloud/debunking-5-myths-about-zero-trust-security/a/d-id/1334064
     
  8. guest

    guest Guest

    5 Ways To Demystify Zero Trust Security
    March 19, 2019
    https://incyberdefense.com/news/5-ways-to-demystify-zero-trust-security/
     
  9. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    Rules-Based Policy Approaches Need to Go
    https://threatpost.com/rules-based-policy-zero-trust/
     
  10. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    Enterprises Showing Increasing Backing of Zero Trust Authentication
    https://www.securityweek.com/enterprises-showing-increasing-backing-zero-trust-authentication
     
  11. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
  12. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    What’s a Next Generation VPN with Zero-Trust Access?
    https://www.infosecurity-magazine.com/opinions/vpn-zero-trust/
     
  13. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    3 Benefits of Zero Trust to Customer Information Security
    https://hackernoon.com/3-benefits-of-zero-trust-to-customer-information-security-7c1dd48of
     
  14. guest

    guest Guest

    The zero trust model explained
    September 4, 2019
    https://www.scmagazine.com/home/opinion/executive-insight/the-zero-trust-model-explained/
     
  15. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
  16. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.