Zero Trust part three: policy and monitoring
In this Part 3 of a series examining Zero Trust in more detail, John provides an in-depth view of the fourth and fifth steps in implementing Zero...
Zero Trust part two: Lockdown your unmanageable apps
In this Part 2 of a series examining Zero Trust in more detail, the creator of Zero Trust, John Kindervag, provides an in-depth view of the second...
Why enforcement based security controls don’t always work
An enforcement-based approach to security
How to secure unmanageable applications
Three steps for securing unmanageable applications in a post-pandemic era
What is application choice?
Application choice: choosing the productivity and efficiency applications of your choice without security or IT approval in the workplace. Today, the...