Network segmentation is a concept that dates back to the start of enterprise IT systems. The simplest demonstration of this is separating application and infrastructure components with a firewall. This concept is now a routine part of building data centers and application architectures. In fact, it’s nearly impossible to find…
Read More
While sitting in metaphysics class one afternoon, I asked my philosophy professor if Frankenstein’s monster is really a monster if he is just the sum of other people’s parts. He gave no reply to this question, only laughed. This memory struck me when I was thinking about a topic that…
Read More
Your organization has invested in dozens of cybersecurity tools. But you’re not sure if they’re working as expected. For example, what percentage of successfully blocked attacks reported by your security information and event management (SIEM) tool are false reports, where the attack actually occurred but was reported as blocked? Zero…
Read More
Implementing conditional access procedures is a crucial part of a zero-trust strategy. But its fair to ask yourself, isn’t access always conditional? Isn’t access to systems and data always granted on the condition that, at a minimum, users enter a username and password? True enough. But the term “conditional access”…
Read More