Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
Blog
Blog
Ransomware Attacks on Critical Infrastructure
Ransomware is a very easy and successful way of making money illicitly, so it is a proven business model unlikely to lose popularity with cyber criminals any time soon. Cybercriminals are also...
Learn more
Whitepaper
Whitepaper
Modernizing Legacy IAM Systems
Legacy IAM systems can no longer meet the requirements of Digital Transformation. They often have a negative impact on business efficiency and customer experience. Such systems are too costly to...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #146: Do You Still Need a VPN?
Virtual Private Networks (VPNs) are increasingly being promoted as an essential security tool for end users. This is not about the traditional access to corporate resources from insecure...
Learn more
The European Cybersecurity Competence Center (ECCC) and the Future of Cybersecurity in Europe
Event Recording
The European Cybersecurity Competence Center (ECCC) and the Future of Cybersecurity in Europe
The Art of Becoming a Multifaceted CISO
Event Recording
The Art of Becoming a Multifaceted CISO
The challenges to information security in companies are increasing every year. The focus is on serious attacks against small and large companies and the urgent need to protect their own...
Software Bill of Material - a Way to Prevent Black Swan Events?
Event Recording
Software Bill of Material - a Way to Prevent Black Swan Events?
SBOM offers multiple ways of getting under the covers of your and other provider's software resilience. Implemented properly, SBOM not only increases code and library transparency with a a much...
Achievement Unlocked: Navigating the Labyrinth of Cyber Leadership
Event Recording
Achievement Unlocked: Navigating the Labyrinth of Cyber Leadership
The role of a CISO has expanded beyond technical competence and compliance – an uncertain threat landscape calls for a technically competent leader with strategic oversight across the board,...
CISO Panel | Mitigating State Sponsored Attacks in Cyber-Space
Event Recording
CISO Panel | Mitigating State Sponsored Attacks in Cyber-Space
Attackers are expected to leverage the uncertain geopolitical landscape to carry out advanced cybercrime attacks, leaving businesses susceptible to intrusions that could have potential second and...
Germany's Cybersecurity Architecture and How it is Linked to International Actors
Event Recording
Germany's Cybersecurity Architecture and How it is Linked to International Actors
Christina Rupp has co-authored a publication of the Stiftung Neue Verantwortung, a Berlin based Think-Tank exploring the intersection of technology and society, on Germany’s Cybersecurity...
Panel | Looking into the International and German Governmental Cybersecurity Architecture
Event Recording
Panel | Looking into the International and German Governmental Cybersecurity Architecture
From Christina Rupp’s initial talk, we have seen that Germany’s governmental cybersecurity architecture is a complex ecosystem. In this Panel Session, we will discuss challenges and...
R.O.N. - Return on Negligence – The Impact of Cybercrime
Event Recording
R.O.N. - Return on Negligence – The Impact of Cybercrime
The cost of doing nothing is something that today we have to factor into many aspects of our lives.  Inaction hurts and we’ll briefly talk about the 6 degrees of separation for the...
Quantum Computers: The Ultimate Opponent for Data Protection
Event Recording
Quantum Computers: The Ultimate Opponent for Data Protection
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises...
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Event Recording
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
Event Recording
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex. But there's good news: asset management has evolved. Today’s...
Previous
3 4 5 6 7 8 9 Next