The foundation of a landmark presidential executive order and now a standard embraced by governments and enterprises globally, zero trust has come far in the past two years. Zero trust creator John Kindervag offers a progress report and insight into the key trends he sees shaping the new year.
The U.S. Army has embarked on its zero trust journey for both its information and network operations. Army CIO Dr. Raj Iyer shares how the military and the private sector are partnering to secure cloud infrastructure and solidify threat intelligence capabilities to fight adversaries.
The primary challenge with zero trust is keeping it simple, operationally efficient and easy to understand, with predictably positive outcomes. This is achieved across various systems, not with different solutions, policies and technologies in different areas, and it should involve minimal friction.
Complexity is the enemy of security, and information technology grows ever more complex. Have we created a problem space in computing so complicated that we will be unable to safely operate in it for its intended purposes? Fred Cohen says that's unlikely. He discusses managing risk in the future.
No vendor can sell you an out-of-the-box zero trust architecture, because zero trust (ZT) is more than just products or infrastructure. It’s a philosophy, a mindset, a strategy and a framework.
A zero trust approach means treating any network as compromised and assuming that threats — both external and internal...
In Part 3 of a three-part video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, describe the operational and business benefits of creating an identity strategy.
In Part 2 of this video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, explain why organizations need to think about identities in the context of humans and nonhumans, their roles and their risks.
Google has long embraced zero trust architecture, and Google Workspace comes with zero trust built into it. Andy Wen of Google discusses the zero trust journey, where he sees enterprises struggle, and how Google Workspace customers can take advantage of the inherent zero trust elements.
In this interview with...
In Part 1 of a three part-video series, Andrew Abel, a cybersecurity and zero trust consultant and CyberEdBoard member, and Chase Cunningham, CSO at Ericom Software, share tips on how to create an identity strategy within the broader context of zero trust.
In an ESG research it was found that employees were spending an average of six hours per week doing work-related tasks outside of office hours. This shows that even before the pandemic hit, the lines between office and home life had begun to blur.
As this lead to a disturbance in the enterprise architecture,...
To enable a secure anywhere, anytime access, Security and risk management (SRM) leaders, responsible for infrastructure security should include some specific activities in their SASE roadmap.
This whitepaper focuses on what should be the strategic roadmap and what are the software-defined and cloud-delivered,...
To select the right ZTNA offering, security and risk management leaders must focus on key capabilities and use cases in the context of security service edge.
Download the report to dive into and learn more on:
Recommendations when assessing ZTNA offerings as part of an infrastructure security...
139% ROI. $4M in savings. And that’s just the beginning.
Globally-recognized analyst firm, Enterprise Strategy Group (ESG), recently evaluated the quantitative and qualitative economic benefits of the Zscaler Zero Trust Exchange. The result? A typical organization can expect:
$4.1 million in savings;