Lynyrd Skynyrd Answers “Who Should Create an Org’s BYOD Policy?”

The worst of LastPass’s year-long battle with an attacker occurred through a personal device, on a home network, putting BYOD back in the spotlight. And for the past three months, most boards, CIOs, and CISOs I know are taking the opportunity to reeval… Continue reading Lynyrd Skynyrd Answers “Who Should Create an Org’s BYOD Policy?”

Zero Trust: Real-World Tactics and Strategies [BrightTalk On-Demand]

Much of my custom zero trust content isn’t publicly available. In this session, I was able to bring custom IANS content to the masses in the (ISC)2 Security Briefing webinar on BrightTalk. The live feedback was outstanding, and I hope you find it usefu… Continue reading Zero Trust: Real-World Tactics and Strategies [BrightTalk On-Demand]

Implementing wireless security in the enterprise [TechTarget Interview]

Learn how to properly secure your enterprise wireless network while considering UX, zero trust and commonly overlooked architectural mistakes. Download a free excerpt from the book.

MORE > Click the title to read the full article.

Continue reading Implementing wireless security in the enterprise [TechTarget Interview]

Zero Trust Product Suites and Enforcement Modes

In this short 15-minute session, you’ll learn about the broad product suite categories such as ZTNA, SASE, SWG, as well as the microsegmentation, and how each solution implements the zero trust security features.

MORE > Click the title to read the … Continue reading Zero Trust Product Suites and Enforcement Modes