Never Trust, Always Verify
What is Zero Trust?
The Zero Trust Network model was created in 2010 by John Kindervag, principal analyst at Forrester Research. Now, ten years later, CIOs, CISOs and other corporate executives are increasingly implementing Zero Trust as the technologies that support it move into the mainstream.
The pressure to protect enterprise systems and data is growing as attacks become more sophisticated. Zero Trust is a security concept centered on the belief that organizations should never automatically trust anything inside or outside its perimeters and instead verify everything trying to connect to its systems before granting access.
The National Security Agency: Embracing a Zero Trust Security Model, provides recommendations for implementing a Zero Trust strategy.
Zero Trust World: This is the Way
By now, many companies have accepted that working from home and remote working are likely to become the new ‘normal’. But that doesn’t necessarily mean their network and systems are up to the task. Read the full article here.
In this blog, ForgeRock's Chief Security Officer Steve White explains why an effective security program must be identity-centered.
‘Zero trust’— this can often sound like just another buzz word for security solutions. The value this term holds is often clouded by the myths that surround it. Either by the wrong information or owing to the term itself. Click here to learn more.
In Keeper's Workplace Password Malpractice Report, 57% of employees admitted to writing their passwords on sticky notes. With so many passwords to manage, it is easy to understand why employees are at a higher risk of phishing. Read more.
Sometimes viewed as a replacement of existing defense capabilities, in reality, zero trust is a security posture augmentation with a stronger focus on identity, segmentation and controlling access from entities, whether they are part of your “trusted” environment or not.
Forrester has recently released their much anticipated Q3 2020 Tech Tide: Zero Trust Threat Prevention Report. This year’s report included Safe-T’s ZoneZero™ Zero Trust Network Access solution. Click here to learn more.
Systancia: The new security perimeter for organizations
We are moving from a situation when an organisation’s network was inside its walls and the Internet outside, to a situation where everything is based on the Internet, which is shared by all organizations’ networks. Read more.
Your data centre is an attractive target for hackers because typically it houses your organization’s most sensitive data. This article covers the expanding list of attack vectors and areas of exploitation as your digital footprint increases.
Podcasts and Videos
Zero Trust, a model that involves assuming every entity attempting to connect to your environment is a potential threat actor, instrumenting granular access control, application-level micro-segmentation, and a least privileged access model. Sounds complicated - where do you start, how do you begin adopting these principles, and what are the options?
ThreatLocker: What Is "Zero Trust" And Why Does It Matter?
Join Danny Jenkins (CEO and Co Founder of ThreatLocker) on this podcast where we define some cybersecurity terms that are often used but rarely understood. Discover the true definitions for "zero trust" and "application whitelisting." You'll learn where these tools fit into your cybersecurity toolbox and find out their strengths (and weaknesses).
Unisys Ep. 10: What Can IT Learn From OT About IoT?
What lessons can Operational Technology share with Information Technology in securely deploying IoT? Chris Blask draws from his 25+ years of experience in manufacturing, combines that with his security expertise, and makes some interesting recommendations about how to securely deploy IoT.
Unisys Ep. 19: Operational Technology Security
In this episode, Ashwin Pal, Director of Cybersecurity in Asia Pacific for Unisys, examines the steps that need to be taken to secure Operational Technology environments.
Kemp: Zero Trust 5-in-5
Kemp’s zero trust architecture provides unique value by native, application-centric proxy capabilities. In this 5-in-5 video, we will discuss what Zero Trust is and why it's important for organizations.
With ZoneZero’s fast deployment, you can easily implement a new SDP solution, enhance your existing VPN infrastructure with ZTNA, and add MFA to any VPN, service, and application.
We work with our partners to deliver solutions and services to make your clients and customers IT environments more secure and compliant and future proof these solutions by tailoring these to suit their needs and requirements. Renaissance and our suite of security vendors and partners are ideally placed to work with industrial organisations to help analyse current security systems, design a way to improve them, and deliver the improvements over time. Starting with the most critical systems and vulnerabilities. Learn more.
Speak to Renaissance about