Related Posts
Boost Your Zero Trust Model with AI-based Cloud Policy Refactoring
Identity and Access Management (IAM) lies at the heart of cloud security. Applying Zero Trust (ZT) to the cloud requires…
06 Mar 2023
Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches
This blog was originally published in May 2022 on ThreatPost.com
31 Aug 2022
Zero Trust for Data – Where the Identity Fabric and Data Fabric get woven together
Zero Trust shouldn’t be just a catchphrase, marketing slogan or network authentication initiative. It’s a necessary paradigm shift in security…
11 Oct 2023
Least Privilege for Data: A Balancing Act
Like other CISO’s, I have long had a love and hate relationship with the principle of Least Privilege. I love…
09 Feb 2024