Securing Remote Access for Contractors, 3rd Parties & Employees

According to the U.S. Bureau of Labor Statistics and research by Harvard and Princeton, there were...

How to Make Data Central to Zero Trust

I had talked about Zero Trust in our previous blog. One of the key elements I discussed was the...

Contextualizing Zero Trust for Data Security

Zero Trust is often used to codify an approach to security. What it means for each individual...

Recap from Black Hat 2021: Data Security Takes Center Stage

It has been a long time since I have been to an in person event. It felt good to be back exchanging...

VPNs for a Zero Trust Application Centric Enterprise

VPNs have been around for a long time and were created to allow remote workers secure access to the...

Subscribe to Blog