
In
Security
Zero Trust part three: policy and monitoring
In this Part 3 of a series examining Zero Trust in more detail, John provides an in-depth view of the fourth and fifth steps in...
Latest articles

In
Security
Zero Trust part three: policy and monitoring
In this Part 3 of a series examining Zero Trust in more detail, John provides an in-depth view of the fourth and fifth steps in implementing Zero...

In
Security
Zero Trust part two: Lockdown your unmanageable apps
In this Part 2 of a series examining Zero Trust in more detail, the creator of Zero Trust, John Kindervag, provides an in-depth view of the second...

In
Security
How to manage multiple social media accounts
Digital marketing in the post-pandemic era has become more complex and extensive. One of the most significant factors to consider is access...

In
Security
5 easy steps to secure your company's social media accounts
Learn how to secure social media applications for your business.

In
Security
Why enforcement based security controls don’t always work
An enforcement-based approach to security

In
Security
How to secure unmanageable applications
Three steps for securing unmanageable applications in a post-pandemic era

In
Security
What is application choice?
Application choice: choosing the productivity and efficiency applications of your choice without security or IT approval in the workplace. Today, the...