5G technology is fast — I mean, really fast. I didn’t realize just how far ahead of 4G technology it was until I visited a vendor booth at a recent conference. The table was lined with smartphones connecting at different generations of cellular technology, and I was asked to spin…
Read More
The concept of zero trust has been around since John Kindervag coined the term in 2010. Google’s internal implementation through it’s BeyondCorp team in 2011 was one of the first examples. The objective of the group was simply to allow “employees to work more securely from virtually any location,” a…
Read More
Is a cybersecurity degree worth it? The answer is yes, but it also depends on who’s asking. Higher education could be a profitable pathway, especially if you’re already a student. However, school isn’t the only way to get your foot in the door. You can land a job in cybersecurity…
Read More
Where does digital security end and tangible, or physical, security begin? In today’s cybersecurity ecosystem, I’d argue that it’s all just security. In fact, if you are handling these domains in discrete silos, your cyber resilience is already taking a hit. If your identity and access management (IAM) and physical…
Read More