Zero trust (ZT) works when deployed consistently, but you can’t apply it to apps that are disconnected from your identity infrastructure. When we think of enterprise apps, we often focus on major SaaS apps like M365 and SalesForce. However, countless...
Tackling the Last Mile Problem in Zero Trust In cybersecurity, the last mile problem continues to challenge organizations striving to implement a comprehensive zero trust strategy. Nonstandard and disconnected applications often fall outside the scope of...
Zero Trust is gaining momentum. Through top-down implementation and the proper incentives, we’ll see more international governments begin to adopt Zero Trust policies in the coming year.
In this Part 3 of a series examining Zero Trust in more detail, John provides an in-depth view of the fourth and fifth steps in implementing Zero Trust architecture — creating policy and monitoring and maintaining the environment.
In this Part 2 of a series examining Zero Trust in more detail, the creator of Zero Trust, John Kindervag, provides an in-depth view of the second and third steps in implementing Zero Trust architecture — mapping transaction flows and defining the...