Zero Trust Should Not Give IT a Bad Name

Maybe you’ve just found out that your company’s IT organization is implementing Zero Trust. Does that mean they don’t trust you? "Zero Trust" sure sounds that way. Maybe you’ve read about it online or heard somebody talk about it in terms that equate Zero Trust with the idea that users and devices are never trusted. It’s hard to feel good about an IT organization that doesn’t trust the company’s own employees. But I don’t think that this view of Zero Trust is the right one. Zero Trust is about putting in place systems that help safeguard both the employees and the company, systems that help ensure that an innocent mistake will not cause terrible damage. Continue reading Zero Trust Should Not Give IT a Bad Name

All Access Is (or Should Be) Remote Access

With the transition to remote work, we often hear the term remote access used in unison. Typically, remote work application access is facilitated via a remote access mechanism and, presumably, local work application access is facilitated via a local access mechanism. But I argue that this connection does not really hold true. Sure, remote work does require the use of a remote access mechanism, but the mechanism can and should also be used for local work. There’s really no such thing as local access. Continue reading All Access Is (or Should Be) Remote Access

Why Zero Trust Needs the Edge

Backhauling traffic destroys performance, and backhauling attack traffic can destroy even more. Nevertheless, in a traditional security deployment model, we are faced with the lose-lose options of either backhauling all traffic to the security stack or allowing some accesses to not go through the security stack. Of course, in the modern world where cyberattacks can cause enormous damage, the latter option is not really an option at all. All traffic must route through a robust security stack. So how do we accomplish this goal without backhauling? The answer is Zero Trust security deployed and delivered as an edge service. Continue reading Why Zero Trust Needs the Edge

Anyone for Alphabet Soup? ZTNA, SWGs, MFA, and More: Lessons Learned from Fed Day CyberThreats 2021

Last week, we gathered a few of the most prominent leaders and experts from every corner of the federal space to talk about all things cybersecurity and digital transformation. Discussions ranged from the move toward Zero Trust Network Access (ZTNA), and effectively managing identities and access with a secure web gateway (SWG) to keep data safe, to what the executive order on cybersecurity means for agencies — time to implement a multi-factor authentication (MFA) solution. Continue reading Anyone for Alphabet Soup? ZTNA, SWGs, MFA, and More: Lessons Learned from Fed Day CyberThreats 2021

Zero Trust Network Access Is an Oxymoron

Though Zero Trust is really quite simple and should be viewed as a very strong form of the age-old principle of least privilege, that does not mean that it is the same thing. In fact, one of the most significant differences from what came before is that when it comes to access, Zero Trust is based on application access, not network access. I was surprised, then, when Gartner’s new SASE (secure access service edge) model included something called Zero Trust Network Access (ZTNA). This term is an oxymoron, and I make this point because it matters. The distinction between network access and application access is important. Continue reading Zero Trust Network Access Is an Oxymoron

Zero Trust: Not As Scary As It Sounds

If the term Zero Trust has been popping up in your news feed with astonishing frequency lately, you may be tempted to think that Zero Trust must be a brand-new technology cooked up in a research lab at MIT and powered by the latest artificial intelligence, machine learning, quantum computing, and a 1.21 gigawatt flux capacitor. In this and subsequent blog posts, I want to make the case that, in fact, Zero Trust is all about simplicity, and that at its core, Zero Trust is a strong form of the age-old principle of least privilege. Continue reading Zero Trust: Not As Scary As It Sounds