As discussed in my first article in this series, whilst Zero Trust must be the goal, there are a few potholes to navigate on the journey. Let me expand slightly more on these caveats, but also expose the greatest ally of Zero Trust. Paul Meyer. Peer to peer (P2P) technologies – prevalent in the […]
Continue readingMore TagTag: Zero-Trust
Why zero trust needs an integrated platform
Successful zero trust can only be accomplished through the construction of an integrated platform that shares information across different security technologies. To reach this level of security, it is essential to have an integrated platform that can centralise and correlate information from various security technologies and tools that have traditionally operated in their own silos. To achieve […]
Continue readingMore TagWhy Zero Trust must be an essential part of cybersecurity strategy
In the early days of computing, security was relatively simple since computers were isolated entities. Physical security was sufficient, with authorised users being granted access to a computer room. However, with the advent of computer networking and the internet, security became more complex. The concept of a physical perimeter protecting the network emerged, one could […]
Continue readingMore Tag