Google Secures It’s Enterprise with Zero Trust Networks
You know how they say “identity is the new perimeter?” Yet for all the hoopla around de-perimeterization over the years, most organizations still have complex firewall infrastructures and clunky VPNs.
Google has reinvented its security perimeter around devices through… Continue reading
Was the Sense of Defeatism at RSA 2015 a Good Thing?
As the RSA 2015 conference (#RSAC2015) was winding down last week, someone commented on what he perceived as a “sense of defeatism.” In sessions and on the show floor “Every vendor is saying “you’re already penetrated.” There… Continue reading
Restricted Zones Redux
“I’m sorry if I’m inconveniencing you and the teachers, but I will not allow a networked computer system to be placed on the ship while I’m in command,” said Commander Adama as I watched the first episode of… Continue reading