Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
KC Open Select
KC Open Select
Zero Trust Network Access
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats.
Learn more
Blog
Blog
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
Standfirst: Identity Management plays a crucial role in addressing IoT, IIoT, and IoMT challenges. Avoid the pitfalls by following some key security best practices.
Learn more
Whitepaper
Whitepaper
Speeding up Zero Trust Delivery using Managed Services
Zero Trust is important as a fundamental and essential paradigm for a stronger cybersecurity posture. Zero Trust, on the other hand, is complex to put in practice. For succeeding with the Zero...
Learn more
Event Recording
Event Recording
Identity Proofing as a Fundamental Element for Zero Trust
Learn more
Why Threat Intelligence is Losing its Edge and How to Overcome Noise Overload
Event Recording
Why Threat Intelligence is Losing its Edge and How to Overcome Noise Overload
New Security Fundamentals: Five Things CISOs and CTOs Should Consider
Event Recording
New Security Fundamentals: Five Things CISOs and CTOs Should Consider
The old saying goes, ‘The more things change, the more they stay the same”. This has never been more true than today in the modern CTO and CISO’s life. As technology evolves,...
Pools of Identity: Best Practices Start With Personal Password Behavior
Event Recording
Pools of Identity: Best Practices Start With Personal Password Behavior
The European Cybersecurity Competence Center (ECCC) and the Future of Cybersecurity in Europe
Event Recording
The European Cybersecurity Competence Center (ECCC) and the Future of Cybersecurity in Europe
The Art of Becoming a Multifaceted CISO
Event Recording
The Art of Becoming a Multifaceted CISO
The challenges to information security in companies are increasing every year. The focus is on serious attacks against small and large companies and the urgent need to protect their own...
Software Bill of Material - a Way to Prevent Black Swan Events?
Event Recording
Software Bill of Material - a Way to Prevent Black Swan Events?
SBOM offers multiple ways of getting under the covers of your and other provider's software resilience. Implemented properly, SBOM not only increases code and library transparency with a a much...
Achievement Unlocked: Navigating the Labyrinth of Cyber Leadership
Event Recording
Achievement Unlocked: Navigating the Labyrinth of Cyber Leadership
The role of a CISO has expanded beyond technical competence and compliance – an uncertain threat landscape calls for a technically competent leader with strategic oversight across the board,...
CISO Panel | Mitigating State Sponsored Attacks in Cyber-Space
Event Recording
CISO Panel | Mitigating State Sponsored Attacks in Cyber-Space
Attackers are expected to leverage the uncertain geopolitical landscape to carry out advanced cybercrime attacks, leaving businesses susceptible to intrusions that could have potential second and...
Germany's Cybersecurity Architecture and How it is Linked to International Actors
Event Recording
Germany's Cybersecurity Architecture and How it is Linked to International Actors
Christina Rupp has co-authored a publication of the Stiftung Neue Verantwortung, a Berlin based Think-Tank exploring the intersection of technology and society, on Germany’s Cybersecurity...
Panel | Looking into the International and German Governmental Cybersecurity Architecture
Event Recording
Panel | Looking into the International and German Governmental Cybersecurity Architecture
From Christina Rupp’s initial talk, we have seen that Germany’s governmental cybersecurity architecture is a complex ecosystem. In this Panel Session, we will discuss challenges and...
R.O.N. - Return on Negligence – The Impact of Cybercrime
Event Recording
R.O.N. - Return on Negligence – The Impact of Cybercrime
The cost of doing nothing is something that today we have to factor into many aspects of our lives.  Inaction hurts and we’ll briefly talk about the 6 degrees of separation for the...
Quantum Computers: The Ultimate Opponent for Data Protection
Event Recording
Quantum Computers: The Ultimate Opponent for Data Protection
Previous
2 3 4 5 6 7 8 Next