Cisco and Luminate partner to provide Zero Trust Access model

Modern enterprise IT and Security teams aim to provide and govern user access to corporate assets deployed in hybrid, dynamically changing environments. The dynamic nature of the modern IT...

Read More

A new approach to enterprise cybersecurity: Zero Trust access delivered as a service

When thinking about the next step in network security, we should all take inspiration from Google’s perimeter-less BeyondCorp initiative, where ad-hoc permissions are granted, based on individual...

Read More

The 3 critical steps to a bulletproof access strategy

It’s an on-the-move, BYOD, cloud-based world. It’s just a fact. And for IT, Security, and Compliance teams – it’s a fact that makes life challenging.

Read More

The one thing you can trust: Zero Trust is here

It is not every day you can wake up and start your morning with exciting news that reinforces your belief in the correctness of your vision and of the professional path you have chosen.

Read More

14 Influential Cloud Security, Infosec & DevOps Experts to Follow

Cloud technology demands big thinkers. As our networks become decentralized, the management and security challenges have grown exponentially, while the attack surface has expanded to the point of...

Read More

DevOps, are you really protected against unauthorized access?

This blog was edited on November 12, 2018

Last month’s exposure of an authentication bypass in libssh library, and especially all the media coverage it received, showed how even “not the most...

Read More