Blog
Featured Topics
-

Decentralized Identity in Zero Trust
Traditional identity systems rely on centralized identity providers (IdPs) that serve as single points of trust and, consequently, single points…
-

Zero Trust and AI Security
Artificial intelligence is reshaping the cybersecurity landscape at an unprecedented pace. As organizations deploy machine learning models for threat detection,…
-

Building a Zero Trust Center of Excellence
A Zero Trust Center of Excellence (ZTCoE) is a dedicated organizational function that serves as the authoritative body for Zero…
-

Implementing Zero Trust in Legacy Enterprises
Legacy enterprises face a paradox when approaching Zero Trust. The organizations with the greatest need for Zero Trust architecture, those…
-

Vendor Risk in a Zero Trust Model
The SolarWinds supply chain compromise, the Kaseya VSA ransomware attack, and the MOVEit Transfer exploitation demonstrated a consistent pattern: attackers…
-

Board-Level Reporting on Zero Trust
Boards of directors are under unprecedented pressure to demonstrate active oversight of cybersecurity risk. The SEC’s 2023 cybersecurity disclosure rules…
-

Governance Models in Zero Trust
Most organizations approach Zero Trust as a technology initiative, focusing on deploying identity providers, microsegmentation platforms, and endpoint detection tools.…
-

Policy Design for Enterprise Zero Trust
Zero Trust without well-designed policies is nothing more than a collection of security tools generating alerts. The policy layer is…
-

Mapping Zero Trust to GDPR
The General Data Protection Regulation fundamentally changed how organizations must think about personal data. GDPR requires that personal data be…