Click to learn more about author Jasen Meece. 2020 brought massive disruptions due to COVID-19, and the abrupt shift to a remote workforce created holes in the cybersecurity landscape for malicious actors to exploit. Amid the pandemic, the harrowing spike in cyberattacks forced all enterprises, large and small, to take a closer look at potential […]
2021 Predictions: How Zero Trust Can Save Organizations from Incidents
Click to learn more about author Mike Riemer. Just when companies began adapting to the workforce of the future and bring-your-own-device trends, the COVID-19 pandemic forced organizations to implement work-from-home mandates. This change has also shown how cybercriminals can adjust their attacks in any environment. While zero trust was previously a buzzword, it should be […]
Pandemic Cloud: Four Considerations in the Rush to Transform
Click to learn more about author Patrick Hubbard. Many businesses have pushed their cloud migration plans into overdrive in 2020. The emergency transition to work from home, significant changes in customer behavior, supply chain challenges, and existing pent-up digital transformation projects created a rapid-migration Voltron for many teams. There’s been amazing delivery on the part of […]
How to Ensure Bulletproof Security for Your RasPi Environments
Click to learn more about author Don Boxley. IT executives have a lot to think about, especially now, when it comes to the Internet of Things (IoT). As IoT has entered the daily lives of the general public, IoT devices and platforms are on the rise across the planet with seemingly limitless user applications. IoT […]
The Data-Centric Zero Trust Paradigm
Click to learn more about author Leonid Sandler. Traditional cybersecurity product categories separate data protection products from network security and cloud workload protection. The reasons go back to the history of the cybertechnology evolution and the major technology players’ spheres of influence. Ultimately, of course, the biggest motivation for any cybersecurity product across any of […]
To Achieve Zero Trust, You Must First Build Trust
Click to learn more about author Mark Cassetta. Zero Trust has earned a promotion from reference architecture to an integral data protection strategy. After all, we are in a time when there should be zero trust in any data that has not been authorized or authenticated. While conversations around Zero Trust have been taking place […]
2020 Will Be the Year of Security First, Connectivity Second
Click to learn about author Josh Flinn. The traditional approach to IT strategy has been network first, data security second. Prepare for this paradigm to shift in 2020, as we move even more definitively into an approach that requires security to take the front seat to connectivity, which flips the original design of the internet […]
Ping Identity Builds and Matures Zero Trust Security Infrastructures
A recent press release states, “Ping Identity, a pioneer in Intelligent Identity solutions, today announced its continued support for enterprises in developing a Zero Trust security infrastructure with new capabilities, practical guidance, and technology integrations. As organizations move away from a static perimeter-based security approach, they’re embracing strategies that require authentication and authorization of every […]
Ping Identity Releases Capabilities Framework for Zero Trust Deployments
According to a recent press release, “Ping Identity, the leader in Identity Defined Security, today announced its capabilities framework and practical guidance for adopting a Zero Trust security strategy. This framework provides reliable direction to companies in any stage of the Zero Trust maturity process to help enable a broad range of use cases and […]