Implementing Zero Trust

Infrastructure-centric security deployed today divides the enterprise users into two domains, trusted users on the inside and untrusted individuals on the outside. Security leaders are

Read More »

SecOps

SecOps is not a new idea. Unfortunately, however, it is still too often seen as a buzzword rather than a realistic paradigm for ensuring cybersecurity

Read More »

OneLogin: Desktop Pro

Welcome to the post COVID-19 world of digital transformation – where workers are remote, devices are plentiful and businesses are living in the cloud. Although many organizations were

Read More »