Zero Trust


The difference between SASE and Zero Trust

Customers often ask me: What is the difference between Zero Trust and SASE? My answer is almost always the same: Nothing….and, everything. Both have taken the industry by storm over the last couple of years, and even more so with the security and access demands on the business driven by the existing remote workforce, but both have different implementation approaches. It is important to understand, however, that one does not fully provide the other; in fact, they reinforce each other.


Mobile Threat Defense (MTD), Zero Trust Network Access (ZTNA) & Extended Detection & Response (XDR)

Gartner recently released the latest version of the Market Guide for Mobile Threat Defense (MTD), which has a significant update to MTD’s definition and splits the technology into distinct categories. Vendors have been broken down into three groups: all-round MTD, network-focused MTD and bundled MTD offerings with EPP, UES or UEM. Wandera is the only vendor to feature in both the all-round and network-focused MTD lists.

Governing API Management and Connectivity

As organizations adopt an API-first approach, there are many connectivity patterns to consider, and the developer experience needs to be excellent to promote adoption. It can be challenging to enforce API governance while enabling developers to build applications. This session recording covers how an organization can empower developers to use Kong securely, enable access control to the Kong API and Manager, enforce authentication/authorization in applications, and implement a zero-trust security model.

Defining Zero Trust Data Protection

The biggest fundamental shift in the era of digital transformation is that data is no longer on a CPU that the enterprise owns. Security teams focused on cloud must invest in the right technology to achieve more complete data protection, and we all need to ensure Zero Trust principles are applied everywhere data needs protection. At Netskope, we describe this as Zero Trust Data Protection. In its simplest form, Zero Trust means: Don’t trust the things you do not need to trust.


Back Again: The Mobile Endpoint Is Now the Policy Enforcement Point in the Everywhere Workplace!

Several years back before the COVID-19 pandemic hit and the work-from-home shift took hold, we wrote a blog about how the mobile-centric zero trust framework removed the traditional perimeter security controls to protect the corporate enterprise network and all connected endpoints from cybercriminals.


Cybersecurity strategy.... To Plan or not to plan...That is the question

What is a strategy? As defined by Merriam Webster…. ‘a carefully developed plan or method for achieving a goal or the skill in developing and undertaking such a plan or method.’ A cybersecurity strategy is extremely important, but many organizations lack a strategy, or they have not kept their strategy and subsequent roadmap current. A strategy is especially important in this day of digital transformation and for key initiatives like Zero Trust.


Zero Trust Architecture: Key Principles, Components, Pros, and Cons

Whom can you trust within your network? In the zero trust paradigm, the answer is no one. The zero trust approach to cybersecurity states that access should only be granted after a user is verified and only to the extent needed to perform a particular task. In this article, we take a detailed look at different approaches to zero trust implementation. We explore the basic principles of a zero trust architecture and consider the key pros and cons of this cybersecurity approach.


Authorizing Microservice APIs With OPA and Kuma

Many companies are leveraging DevOps, microservices, automation, self-service, cloud and CI/CD pipelines. These megatrends are changing how companies are building and running software. One thing that often slips through the cracks is security. With microservices, there’s an increase in the number of APIs companies have to protect. YouTube An error occurred. Try watching this video on, or enable JavaScript if it is disabled in your browser.