Going from Zero to Zero Trust Security

Going from Zero to Zero Trust Security Several recent events have made Zero Trust security a mandate for companies, governments, and non-profits. The US Government has taken a decisive leadership in this area as depicted by the following initiatives. The Office of Management and Budget (OMB) and the Cybersecurity and Infrastructure Security Agency (CISA) [1] […]

Policy Implementation

McKinsey the Maven has spoken and…

McKinsey the Maven has spoken and… “Security as code: The best (and maybe only) path to securing cloud applications” Welcome to Zero Trust Data Security! Nat Natraj “Managing security as code enables companies to create value in the cloud securely”, the McKinsey article authors further opined. We have come to respect McKinsey’s pundit-like viewpoints in “board room” business […]

Identity is the New Perimeter

Identity is the New Perimeter The perimeter is porous.. identity is the new perimeter The last few years has seen a tectonic shift in the velocity and sophistication of software development and deployment models. The following depicts this shift. In this move to multi-cloud architectures, it has been established that we live in a “perimeter-less” […]