Zero Trust Should Not Give IT a Bad Name
Maybe you've just found out that your company's IT organization is implementing Zero Trust. Does that mean they don't trust you? "Zero Trust" sure sounds that way. Maybe you've read about it online or heard somebody talk about it in terms that equate Zero Trust with the idea that users ... Read More
All Access Is (or Should Be) Remote Access
With the transition to remote work, we often hear the term remote access used in unison. Typically, remote work application access is facilitated via a remote access mechanism and, presumably, local work application access is facilitated via a local access mechanism. But I argue that this connection does not really ... Read More
Zero Trust Network Access Is an Oxymoron
Though Zero Trust is really quite simple and should be viewed as a very strong form of the age-old principle of least privilege, that does not mean that it is the same thing. In fact, one of the most significant differences from what came before is that when it comes ... Read More
Zero Trust: Not As Scary As It Sounds
If the term Zero Trust has been popping up in your news feed with astonishing frequency lately, you may be tempted to think that Zero Trust must be a brand-new technology cooked up in a research lab at MIT and powered by the latest artificial intelligence, machine learning, quantum computing, ... Read More
Zero Trust: The Protection Model for the Post-Pandemic World
One year and a half following the start of the COVID-19 pandemic, we're seeing most companies either maintaining their remote work policies or slowly moving to a hybrid model. In fact, an estimated 36.2 million Americans will be working remotely by 2025, which is nearly double pre-pandemic levels ... Read More
The Countdown Has Started — The Move Toward Zero Trust and MFA
In early May 2021, the President of the United States issued an executive order on cybersecurity, and though it will take some time for executive branch agencies to develop formal rules, the order itself includes a lot of what I consider to be best practice in cybersecurity, including the use ... Read More
Corporate Office and Kitchen Table: Securing the Future of Work, Part 2
The workforce is remote, the data center is the cloud, the corporate network is the internet, and the security stack is at the edge ... Read More
Corporate Office and Kitchen Table: Securing the Future of Work, Part 1
The future of work is multi-modal, the future corporate office is a private coffee shop with great W-iFi, and the future of enterprise security is going to have to adapt rapidly ... Read More
Enabling Business Continuity in an Uncertain Global Environment
Today's uncertain global environment has made it an imperative for companies to enable remote access to business-critical applications. In particular, the fluidity and uncertainty of the current global crisis triggered by COVID-19 have accelerated the movement to have employees work ... Read More