Extending Zero Trust to the Endpoint
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010. Initially, Zero trust referred to an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter ... Read More
Extending Zero Trust to the Endpoint
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010. Initially, Zero trust referred to an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter ... Read More
Is it time for Work 2.0 ?
If you’re reading this post, you’ve probably already heard about “unified endpoint management”, “enterprise mobility management”, the “digital workplace”, and other related buzzwords. However, the way we provide a work space to employees hasn’t significantly changed in the last decade. It still mainly consists of some mix of the following ... Read More
Is it time for Work 2.0 ?
If you’re reading this post, you’ve probably already heard about “unified endpoint management”, “enterprise mobility management”, the “digital workplace”, and other related buzzwords. However, the way we provide a work space to employees hasn’t significantly changed in the last decade. It still mainly consists of some mix of the following ... Read More
Can container/docker benefits apply to client apps too?
You’ve probably heard about containers before. In the unlikely case that you missed the hype, but here’s a quick recap: containers are bundles of applications and their dependencies. With containers, it’s possible to reliably/predictably/consistently run apps regardless of the underlying computing infrastructure they run on. Containers run in the same ... Read More
Can container/docker benefits apply to client apps too?
You’ve probably heard about containers before. In the unlikely case that you missed the hype, but here’s a quick recap: containers are bundles of applications and their dependencies. With containers, it’s possible to reliably/predictably/consistently run apps regardless of the underlying computing infrastructure they run on. Containers run in the same ... Read More
Enter the Matrix: Cyber Security Risk Assessments Demystified
Cyber security professionals are, by definition, in the risk management business. Your job is all about making sure information systems and sensitive data are protected against cyber attacks. And now with COVID 19 pushing more workers — and work — online than ever before, getting a handle on your evolving ... Read More
Working from the Home Front Securely
It is said that home is where the heart is, but with the coronavirus (COVID-19) forcing a large part of the workforce to work from home to help contain its spread, home could be where the headache is. Increasingly, companies are employing work-from-home policies, with travel restrictions, quarantining, “social distancing” ... Read More
3 Desktop as a Service (DaaS) Security Risks
Desktop-as-a-Service (DaaS) has recently gained momentum with Microsoft making Windows Virtual Desktop (WVD) generally available and increasing its investment in this service. WVD basically lets companies host low-cost Windows desktops in the cloud, as an alternative to traditional on-prem VDI desktops. A major use case for DaaS is providing users ... Read More
Implementing Privileged Access Workstations For Zero Trust Architecture
The Problem with Zero Trust With more and more enterprises moving to mobile and cloud technologies, it’s becoming extremely difficult to enforce perimeter security. That’s why so many organizations are adopting Zero-Trust Architecture (ZTA). It enables them to grant access based on device/user credentials instead of a user’s presence in ... Read More

