Zero Trust is definitely not new but around for something like 16 years if you look at it. This is, when the Jericho Forum was formally established and Network Access Control architectures started to get deployed (or at least designed). It definitely got some tailwind 10 years later with Google’s work on BeyondCorp (as a…Details
With people working remotely at the moment, managing the insider risk is one of the important areas to look at. We often look at three scenarios: Data theft by departing employees Intentional or unintentional leak of sensitive or confidential information Actions and behaviors that violate corporate policies We released a product called Insider Risk Management…Details
As you might know, I am part of the Cybersecurity Advisory Board of the Swiss Academy of Engineering Sciences here in Switzerland. In this capacity I had the opportunity to publish an article at Inside IT: SATW insights: Zero Trust – Sicherheit in Zeiten von Homeoffice (in German).
One area, where our story was not as strong as the rest was IoT/OT. We have a broad portfolio already in Azure IoT offering different options to manage IoT and OT devices from the cloud but in the security space there was room for improvement. With the acquisition of CyberX, which we announced yesterday (Microsoft…Details
We often get questions about how we protect the AAD infrastructure and how the data is governed. This paper gives you really good background: Azure Active Directory – Data Security Considerations
I guess you heard the ruling by the Court of Justice for the European Union on cross-border transfer. I think it is important to understand our position on this as outlined here: Assuring Customers About Cross-Border Data Flows From my point of view the important parts are: Today the Court of Justice for the European…Details
Since Covd-19 started, I probably talked more about Zero Trust than ever before. Not that the concept is new, but the pressure to apply it, suddenly increased dramatically with all the users sitting at home and not within the “well-protected” network perimeter. There were different challenges companies faced these times but two came up repeatedly:…Details
In my last post we looked into why Zero Trust is not this huge revolutionary vision but something reflecting today’s reality. Technology is ready to go –technology is ready for you to embark on a journey and start to align your security architecture and investments with this approach. The biggest change when implementing Zero Trust…Details