Tag: Zta

The Zero Trust Authorization Core

April 8, 2020   |   Derrick Johnson

This is part 2 of a 3 blog series. You can also read part 1 and part 3 The Foundation of a Zero Trust Architecture (ZTA) talked about the guiding principles, or tenets of Zero Trust.  One of the tenets mentions how all network flows are to be authenticated before being processed and access is determined by dynamic policy.   A network… Read more →

The foundation of a Zero Trust architecture

April 1, 2020   |   Derrick Johnson

Part 1 of a 3 blog series. You can also read part 2 and part 3. Organizations have placed a lot of time, effort and capital spend on security initiatives in an effort to prevent security breaches and data loss.  Even the most advanced “next generation” application layer firewalls filtering malicious traffic at the network perimeter has only revealed equal if… Read more →

Featured resources

 

 

2024 Futures Report