From the Winter 2024 Issue

,

The Unintended Consequences of Connectivity: How a Zero Trust Approach Can Shrink the Attack Surface

Author(s):

Tina Gravel, SVP Global Channels and Alliances , Appgate

Robert Metcalfe, co-inventor of Ethernet and considered one of the founding fathers of the modern Internet, is renowned for many things, but perhaps none more so than his namesake law: Metcalfe’s Law. Metcalfe’s Law was initially presented in 1980 to describe the intrinsic value of a telecommunications network and has since been popularized as ‘The … Read more

From the Summer 2023 Issue

Navigating the Environment of Zero Trust Architecture: How to Avoid Confusion and Begin Preparations

Author(s):

Lauren Beward, Senior Cybersecurity Specialist, ArCybr

For those who work in Department of Defense (DoD) and Government contracting, the term “Zero Trust Architecture” (ZTA) can be found everywhere, an oft-quoted buzzword that outlines the future of cybersecurity for our Nation’s networks and systems. So, what is ZTA really, and how will it affect security standards and processes in the future? This … Read more

From the Fall 2022 Issue

Zero Trust is Not a Product

Author(s):

Alex Haynes, CISO , IBS Software

Zero Trust is Not a Product

Every year at the bevy of conferences that dot the Information Security landscape you can always detect an inherent theme. This may be influenced by acute threats (i.e., Ransomware), a new regulatory environment (i.e., GDPR) or even just a sudden change in how we work, as we all experienced during the pandemic. The issue Zero … Read more

From the Summer 2022 Issue

Three Security Challenges Federal Agencies Can Overcome with SASE, Zero Trust and SSE

Author(s):

Shamla Naidoo, Head of Cloud Strategy and Innovation, Netskope

Netskope Summer 2022 feature

New Federal Zero Trust Strategy Requires a New Approach to Create More Trust, Not Less One of the challenges to zero trust adoption that agencies have been wrangling with is the definition. Following Executive Order 14028 to improve the nation’s cybersecurity and protect federal government networks, the Office of Management and Budget (OMB) recently released … Read more

From the Spring 2022 Issue

Moving Toward a “Continuous Adaptive Trust”

Author(s):

James Christiansen, VP, Cloud Security Transformation, Netskope

The term “Zero Trust” is the lack of implicit trust. When we started with “zero trust,” we no longer trusted users because they weren’t on our network domain.  As our staff went remote, we had to input stronger authentication to move from Zero Trust to some level of implicit trust. The problem is that trust is all or … Read more

From the Winter 2022 Issue

Is Zero Trust Set Up to Fail?

Author(s):

Bob Gilbert, VP, Security Cloud GTM Strategy and Chief Evangelist, Netskope

Why Data Context is Key to Successful Zero Trust Implementations The nature of business today is increasingly decentralized. Cloud applications are exploding; data is everywhere. And a large number of users will continue to work remotely even post-COVID-19. While all of these things increase business agility, they also increase an organization’s attack surface. The concept … Read more