Last year after a briefing with an analyst from Forrester, we were encouraged to participate in Forrester’s Zero Trust Wave. Who were we to decline? For those of you who are not familiar, Forrester is the analyst firm that has been espousing Zero Trust as a security philosophy. Of note – Zero Trust is a proactive security strategy, rather than a detection-based strategy.
Breaking up isn’t always hard to do. Sometimes things run their course, and a relationship outlives its usefulness. Our only regret is not realizing it sooner!
Remember toll plazas?
We used to have to pay tolls in cash to collectors at checkpoints on highway and bridges. It was a terrible bottleneck. Highways are there to get you where you need to go quickly. Tollbooth checkpoints are the opposite of quick. They just slow everyone down.Read more »
Why hack in when you can log in? That is the wisdom of attackers today.Read more »
Network segmentation is a well-known approach to network security and has been lauded as a way to improve security and reduce your attack surface. At Illumio, we talk a lot about the value of our product being the best solution for segmentation because our software actually allows network and security teams to “decouple” – that is, allow the security segmentation policy to be independent of network infrastructure and constraints.
But you might ask yourself: why is that important? Here’s your Decoupling 101.Read more »
It is a DevOps world – and the rest of us are just living in it. While this isn’t the case entirely, it can feel this way given how often we hear about DevOps, microservices, and containers.
Truth be told, it was clear in 2015 when we began securing Docker containers that DevOps and the continuous software delivery process was already bringing tremendous business and technical value. Containers break applications into more manageable pieces for more efficient software development that gets new applications and features into the hands of users and customers quickly.