trusted access
The One-Two Punch of User and Device Trust
Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications. It uses strong two-factor authentication to ensure your users are who they say they are. But trusting users is only one component of the trusted access…
Better Security with Trusted Access
Better. As we think about security in 2019, let’s consider the theme for this year’s RSA Conference: Better But as RSAC asks, what defines better? It is better security tools? Better threat intelligence, Better machine learning classifiers? Yes. And more. Much like RSAC suggests, bet…
The Zero Trust Games are here!
Every year at RSA Conference, a pitched battle ensues for the heart and soul of the security practitioner. Or at least for the mind: there’s the word cloud of topics that show up most often in the CFP submissions, but there are more slogans, phrases and concepts that meet in the expo hall to fight f…
New Year, Same Reality: How Much Will Security Actually Change in 2019
If we look back at the security landscape of 2018, there were some interesting highs and lows. There were a number of large-scale breaches in the news attributed to hackers, involving notable companies. All indications for 2019 don’t show any signs of this activity stopping or slowing down. In fact…
Forrester’s Zero Trust or Gartner’s Lean Trust?
Zero trust is misnamed There’s been many management approaches that include the “Zero” term. In shipping, there was “Zero Inventory”. In manufacturing, there was “Zero Defects”. In environmental planning, there’s “Zero Waste”. So, it’s not surprising that the security industry has adopted “Zero Trus…