Overheard at RSAC 2019

Overheard at RSAC 2019

As I write this, I’m waiting for the final keynote of RSAC 2019 to begin—a conversation with actress Tina Fey. I’m not sure what she will be talking about in relation to ...
Security Boulevard
Windows® Domain Controller and Zero Trust Security

Windows® Domain Controller and Zero Trust Security

There’s a new security model being adopted in the IT world these days. It is known as Zero Trust Security, and you can see its instantiation in models such as Google® BeyondCorp ...

Inner Circle Podcast Episode 021 – Wendy Nather Talks about the Value of Zero Trust Security

I was honored to have Wendy Nather, head of advisory CISOs for Duo Security–now part of Cisco, join me as my guest for this episode of the Inner Circle podcast. Wendy is ...
Why network-level access is critical… for attackers!

Why network-level access is critical… for attackers!

In recent months, we’ve seen a new trend where malware is used to load and distribute other types of threats like ransomware, trojans, backdoors etc. Malware distribution as a service. One recent ...
Zero Trust is the InfoSec trend of 2018: Here’s Why

Zero Trust is the InfoSec trend of 2018: Here’s Why

The use of cloud applications and cloud-based storage have become so popular that organizations are being compelled to re-define and update their security and access strategy to protect their globally distributed digital ...

Trustworthy Network Segmentation for an Untrustworthy World

Denial is not a strategy. The reality is that networks, PCs and XenApp clients are susceptible to attacks, if they haven’t been breached already. Network segmentation is an imperative. Organizations need to ...
How I Became A Believer In Consuming IT Security As A Service

How I Became A Believer In Consuming IT Security As A Service

This article was originally published in Forbes ...

How to Isolate Sensitive Data from Compromised PCs and Networks

In your organization’s IT environment, the reality is that networks and end user PCs are vulnerable, which leaves your sensitive data exposed. To contend with this reality, establishing segmented networks for sensitive ...
InfoSec team: this Thanksgiving give thanks for Zero Trust

InfoSec team: this Thanksgiving give thanks for Zero Trust

| | DEVOPS, Infosec, zero trust
Thanksgiving – when families get together and express gratitude for everything they have. Traditionally this is a time for looking back to evaluate the past year and to give thanks for how ...
To Trust Or Not To Trust: That Is The Question

To Trust Or Not To Trust: That Is The Question

Information security is a field that has received a lot of attention in recent years from theoreticians and practitioners alike. Coming from an IT network security practitioner background over the last 15 ...
Loading...