Zero Trust: Identity at the Core

In my last post we looked into why Zero Trust is not this huge revolutionary vision but something reflecting today’s reality. Technology is ready to go –technology is ready for you to embark on a journey and start to align your security arc… Continue reading Zero Trust: Identity at the Core

Why Zero Trust reflects today’s challenges

Since Covd-19 started, I probably talked more about Zero Trust than ever before. Not that the concept is new, but the pressure to apply it, suddenly increased dramatically with all the users sitting at home and not within the “well-protected&#822… Continue reading Why Zero Trust reflects today’s challenges

Today’s Court Ruling on Data Privacy in EU

I guess you heard the ruling by the Court of Justice for the European Union on cross-border transfer. I think it is important to understand our position on this as outlined here: Assuring Customers About Cross-Border Data Flows From my point of view th… Continue reading Today’s Court Ruling on Data Privacy in EU

Hackers don’t break in – they log in

We talked about this very often so far: Passwords are by far the weakest link when it comes to security today. 81% of successful attacks involve lost, breached or re-used passwords. There is another fairly current article mentioning that, even when it … Continue reading Hackers don’t break in – they log in

Secure Virtual Coffee – Top of Mind?

< Deutsch weiter unten> Yes, I am sitting in my Home Office – as you might these days. Maybe the difference is that I am more or less used to this situation, my family knows how to cope with it and I have the infrastructure to do so. Talk… Continue reading Secure Virtual Coffee – Top of Mind?

How to leverage “Secure Access Workstations” for the Cloud

This is a questions I get fairly often. But before I try to answer, let’s take a step back: We know that attackers typically try to compromise user accounts and then move laterally until they find higher-value credentials. The holy grail in this … Continue reading How to leverage “Secure Access Workstations” for the Cloud