trusted access

March 25, 2019

SECURITY

The One-Two Punch of User and Device Trust

Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications. It uses strong two-factor authentication to ensure your users are who they say they are. But trusting users is only one component of the trusted access…

March 6, 2019

SECURITY

Better Security with Trusted Access

Better. As we think about security in 2019, let’s consider the theme for this year’s RSA Conference: Better But as RSAC asks, what defines better?  It is better security tools?  Better threat intelligence, Better machine learning classifiers?  Yes.  And more. Much like RSAC suggests, bet…

February 27, 2019

SECURITY

The Zero Trust Games are here!

Every year at RSA Conference, a pitched battle ensues for the heart and soul of the security practitioner. Or at least for the mind: there’s the word cloud of topics that show up most often in the CFP submissions, but there are more slogans, phrases and concepts that meet in the expo hall to fight f…

January 25, 2019

SECURITY

New Year, Same Reality: How Much Will Security Actually Change in 2019

If we look back at the security landscape of 2018, there were some interesting highs and lows.  There were a number of large-scale breaches in the news attributed to hackers, involving notable companies. All indications for 2019 don’t show any signs of this activity stopping or slowing down. In fact…

January 14, 2019

SECURITY

Forrester’s Zero Trust or Gartner’s Lean Trust?

Zero trust is misnamed There’s been many management approaches that include the “Zero” term. In shipping, there was “Zero Inventory”. In manufacturing, there was “Zero Defects”. In environmental planning, there’s “Zero Waste”. So, it’s not surprising that the security industry has adopted “Zero Trus…