Subscribe

Feb 20, 2025 l PCI DSS, Compliance

PCI DSS 4.0 at Scale: Enterprise Strategies for Multi-Region Compliance

As the deadline for PCI DSS 4.0 compliance nears, many organizations face a twin headache. Not only must they meet the strict set of requirements mandated by the standard. Many must also ensure they do so across multiple regions, business units, and potentially payment systems.

Read more

Jan 23, 2025 l Zero Trust

The Future of Data Security is Zero Trust: Here’s Why

The modern enterprise is fluid, dynamic and distributed. The old network perimeter is gone. And threat actors bypass corporate defenses with...

read more

Oct 28, 2021 l Data Protection, Zero Trust

4 Myths About Data-centric Security on the Journey to Zero Trust

If you’ve been tracking along with this entire blog series, you know that I’ve covered a lot of ground both technical- and business-wise. I started...

read more

Oct 19, 2021 l Data Protection, Zero Trust

Starting with Data-centric Security: a Cost-Benefit Analysis

If you take a close look at the different reference architectures and best practices documents surrounding the Zero Trust methodology, you’ll find...

read more

Oct 12, 2021 l Data Protection, Zero Trust

Applying Data-centric Security Early in your Zero Trust Initiative

My previous post in this series ended with a pretty definite statement: if data is all-important to hackers and other threat actors and is the...

read more

Oct 5, 2021 l Data Protection, Zero Trust

Data is the Prize - The Pillars of Zero Trust from Another Perspective

In fascinating 2018 testimony before a US congressional subcommittee on terrorism and illicit finance, Lillian Ablon provides insights into what...

read more

Sep 28, 2021 l Data Protection, Zero Trust

Zero Trust Series Part 1: Why Data Protection is the Keystone for ZT

Zero Trust has a nice ring to it, in a firm and sort of non-compromising way. Not only does it sound serious, it sounds pretty final too. I mean, if...

read more
1