Skip to main content
img-ds-ZT-Mitre-Attack-blog-hero
We came across this recent Joint Cybersecurity Advisory paper: "Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization," co-authored by the Cybersecurity & Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (...
DS-GL-Zero-Trust-1975-Blog-image
There's been quite a buzz about Zero Trust in the last couple of years. Its genesis dates back to 2009, when the then Forrester Research analyst John Kindervag popularized the term when presenting the idea that an organization should not extend trust to anything inside or outside its perimeters. How...