Best practices for Securing Office 365 against pervasive cloud collaboration risks

The SolarWinds hack  of December 2020 has deeply reinforced the growing realization amongst security practitioners that risks can spread easily across trusted applications in today’s multi-cloud, collaboration-centric environment.  The fact that the in… Continue reading Best practices for Securing Office 365 against pervasive cloud collaboration risks

Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

The Growing Need for Zero Trust Network Access As we set the stage for wider adoption of Zero Trust Remote Access methodology and solutions, it’s worth a quick look back at the traditional mindset. Traditional perimeters were obviously created on the a… Continue reading Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

The Growing Need for Zero Trust Network Access As we set the stage for wider adoption of Zero Trust Remote Access methodology and solutions, it’s worth a quick look back at the traditional mindset. Traditional perimeters were obviously created on the a… Continue reading Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices