The US NIST published a great guide on a zero trust architecture that definitely is worth reading and details the elements, deployment and deployment scenarios and reference to other material to help people get started with zero trust.
The US NIST published a great guide on a zero trust architecture that definitely is worth reading and details the elements, deployment and deployment scenarios and reference to other material to help people get started with zero trust.
Part one and part two of this series
Please check outContinuing our series about metrics for segmentation, there are a couple more angles how you can measure the effectiveness of your segmentation.
I read a nice article by Ericka Chickowski on Darkreading the other day. The article gives some great guidance on what to do and not to do when starting your segmentation journey. Here are some comments.
The practice of microsegmentation takes the principles of least privilege to their logical conclusion by atomizing the isolating techniques of network segmentation. Security architects use microsegmentation to create security boundaries that can extend all the way into individual workloads by controlling East-West, or server-to-server, traffic flows between applications. The bulkheads put up through microsegmentation make it possible to better limit lateral movement of attackers, even in a cloudy world with no perimeter.
Next week it is the ITSA 2019 in Nuremberg and i thought it will be good to give you high priests of segmentation a overview of the companies exhibiting their solutions for segmentation and microsegmentation there.
This one is special, because you will have the chance to meet me personally presenting the power of host-based microsegmentation to you for the three days of ITSA 2019. Feel free to come by and ask me anything about Illumio, this site or really anything that comes up.