Content Paint

Zero Trust

BT's Dave Harcourt speaks at Zscaler's conference in The Hague

How do you protect legacy technology from the threats of tomorrow? Security chief at world's oldest telecoms firm shares rare insights into its move towards a post-trust world

There's no zero trust if you trust the network...

"We are forced to ‘trust’ the Internet – open inbound ports on our firewalls – and then our app server, web server or API server does the final authorization inside our DMZ..."

The slow demise of the VPN: 5 lessons from DoD's Zero Trust framework

From culture to SASE, DevSecOps to network segmentation

Pentagon admits hackers “roam freely” in its IT systems, eyes Zero Trust

"Previous deployments of application and server stacks have had issues..."

Trust no-one: the challenge of implementing Zero Trust in legacy environments

Strong walls aren't enough to stop attackers, writes Guy Warren.

How a devastating ransomware attack forced a radical security rethink

"Like brain surgery without putting the victim to sleep"

Tips on building an actual Zero Trust environment in a complex hybrid world

"Building the muscle" and software-defined micro-segmentation

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.