BT "Our infrastructure is not designed for it": BT security leader reveals the challenges of deploying zero trust How do you protect legacy technology from the threats of tomorrow? Security chief at world's oldest telecoms firm shares rare insights into its move towards a post-trust world
Zero Trust There's no zero trust if you trust the network... "We are forced to ‘trust’ the Internet – open inbound ports on our firewalls – and then our app server, web server or API server does the final authorization inside our DMZ..."
Cybersecurity The slow demise of the VPN: 5 lessons from DoD's Zero Trust framework From culture to SASE, DevSecOps to network segmentation
Cybersecurity Pentagon admits hackers “roam freely” in its IT systems, eyes Zero Trust "Previous deployments of application and server stacks have had issues..."
Cybersecurity Trust no-one: the challenge of implementing Zero Trust in legacy environments Strong walls aren't enough to stop attackers, writes Guy Warren.
Cybersecurity How a devastating ransomware attack forced a radical security rethink "Like brain surgery without putting the victim to sleep"
Cybersecurity Tips on building an actual Zero Trust environment in a complex hybrid world "Building the muscle" and software-defined micro-segmentation