If you’ve been tracking along with this entire blog series, you know that I’ve covered a lot of ground both technical- and business-wise. I started...
Oct 28, 2021 l Data Protection, Zero Trust
4 Myths About Data-centric Security on the Journey to Zero Trust
Oct 19, 2021 l Data Protection, Zero Trust
Starting with Data-centric Security: a Cost-Benefit Analysis
If you take a close look at the different reference architectures and best practices documents surrounding the Zero Trust methodology, you’ll find...
Oct 12, 2021 l Data Protection, Zero Trust
Applying Data-centric Security Early in your Zero Trust Initiative
My previous post in this series ended with a pretty definite statement: if data is all-important to hackers and other threat actors and is the...
Oct 5, 2021 l Data Protection, Zero Trust
Data is the Prize - The Pillars of Zero Trust from Another Perspective
In fascinating 2018 testimony before a US congressional subcommittee on terrorism and illicit finance, Lillian Ablon provides insights into what...
Sep 28, 2021 l Data Protection, Zero Trust
Zero Trust Series Part 1: Why Data Protection is the Keystone for ZT
Zero Trust has a nice ring to it, in a firm and sort of non-compromising way. Not only does it sound serious, it sounds pretty final too. I mean, if...