Eight Artificial Intelligence Predictions for 2024
By Rob Quickenden Our social media feeds are full of predictions for the year ahead, after all, 2023 was an exciting and crazy year in tech with arguably some of the biggest advances we have […]
By Rob Quickenden Our social media feeds are full of predictions for the year ahead, after all, 2023 was an exciting and crazy year in tech with arguably some of the biggest advances we have […]
By Andy Ruth, of Sustainable Evolution Change management isn’t any different for Zero Trust than it is for any other big initiative. But most of us aren’t very good at change management. And security and […]
The Open Group, the vendor-neutral technology standards organization, is hosting its upcoming event October 30 – November 2, 2023 in Houston, Texas. The event brings together experts, government officials, industry leaders, and experienced practitioners in […]
The recent Chief Architect Forum (CAF), a gathering of some of the world’s leading IT architects, was a rousing success for the global IT architect community. To learn more about what made this event so […]
By Andy Ruth, Notable Architect Increasing automation and using change management techniques can help you integrate a Zero Trust strategy into a function SecOps environment. Some keys to modeling this workstream: · Start by creating […]
By Andy Mills The Application Programming Interface (API) is now the bedrock of our digital ecosystem, acting as the glue between systems and applications and enabling businesses to rapidly deliver services. However, APIs are frequently […]
By Andy Ruth, Notable Architect (Part 1 appeared Tuesday here.) As you are modeling a Zero Trust initiative into workstreams, a logical separation is by access control and asset protection. Access control is focused on the […]
By Andy Ruth, Notable Architect As you are modeling a Zero Trust initiative into workstreams, a logical separation is by access control and asset protection. Access control is focused on the request, so identity, device, […]
By Phil Robinson, Principal Security Consultant, Prism Infosec The concept of Zero Trust is “never trust, always verify” so that in a Zero Trust Architecture (ZTA) every access request is regarded as potentially hostile and […]