Mapping apps, data and users for zero trust endpoint security
Most organisations have been moving to a zero trust security model to effectively secure IT assets. But first we have to know what we have and map the endpoints
Most organisations have been moving to a zero trust security model to effectively secure IT assets. But first we have to know what we have and map the endpoints
The advent of the software as a service (SaaS) model has undoubtedly brought along a major paradigm shift in the history of IT — and has become a go-to for many organizations today. The...
July 14, 2021, marked the advent of a new term: Cyber asset attack surface management (CAASM). Gartner announced its arrival in the Hype Cycle for Network Security 2021. “What’s CAASM?” you ask. CAASM is...
In all of my years working in cybersecurity, I never thought I’d create my own framework — let alone one for threat intelligence programs. Why? Because I didn’t think I had anything impactful enough to...