Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero Trust

Featured Post

Zero Trust is not a shortcut to security

According to a recent Microsoft report, Zero Trust is now 'the top security priority' for 96% of the interviewed security decision makers, while 76% said they were currently in the process of implementation. Microsoft's report also says that the biggest challenges facing adoption are perceived investment and effort to achieve the principle in practice. Sounds familiar, but the reality of Zero Trust is that, for the most part, it's nothing new.

Zero Trust Summit Fireside Chat with Jim Dolce

Jim Dolce was featured on a moderated main stage discussion, alongside Francis Rose, at the Zero Trust Summit in Washington, D.C. This engaging conversation examined how to secure the edge to meet OMB Zero Trust requirements. The event gathered top government IT decision makers and influencers in-person and virtual via livestream for a day of engaging conversations on the adoption of Zero Trust.

Simplify and Scale Zero Trust Integrations with Netskope and CrowdStrike

We’ve seen major shifts in the digital landscape that have far reaching implications on organizations around the world. These include the widespread adoption of hybrid work, the accelerated migration from on-premise to cloud resources, and the exponential increase of data in the cloud.


Elastic provides the foundation for the DoD's pillars of Zero Trust Networking

The whole point of IT systems, whether deployed via traditional methods or via modern practices (such as Agile methodologies, DevSecOps, and orchestration platforms like Kubernetes) is to make data available for business operations — whether those operations are making business decisions, identifying or troubleshooting system performance and efficiency issues, detecting bad actors, or protecting organizational assets.


Applying a Continuous Adaptive Trust Mindset

The term “zero trust” is the lack of implicit trust. When we started with “zero trust,” we no longer trusted users because they weren’t on our network domain. As our staff went remote, we had to input stronger authentication to move from zero trust to some level of implicit trust. The problem is that trust is all or nothing.


Implementing zero-trust workload security on Amazon EKS with Calico

Whether you’re migrating to the cloud via lift-and-shift deployments, or re-architecting to a cloud-native architecture, the migration itself and adopting a microservices architecture is no easy feat. To accelerate their cloud-native journey, many organizations opt for a managed Kubernetes service, as the skill and resources required to run a container orchestration system at scale are demanding.


US DoD's Adoption of Zero Trust Heats Up

The US Department of Defense (DoD) initiative to adopt the Executive Order for Zero Trust is heating up. This week the Pentagon’s CIO, John Sherman, announced plans to implement a zero trust architecture agency-wide within the next 5 years – by 2027. To support this initiative, he plans to announce a new strategy next month to help meet the ambitious deadline for an agency of over 4 million people.