Posts by Jacob Frehn
Thunderdome: DISA’s Next Phase for Zero Trust
DISA’s Thunderdome project aims to create a new cybersecurity and network architecture for the DoD’s transition to zero trust.
Read MoreHow the Zero Trust Security Model Is Evolving To Stop Cyber Threats
Zero trust has evolved to become a practically fail-proof security model – serving as a more effective, risk-based solution for stopping malicious threats.
Read MoreNIST Releases New AI Risk Framework to Combat Emerging Threats from Malicious AI
NIST’s AI Risk Management Framework aims to mitigate threats from malicious AI while ensuring the development of trustworthy AI systems.
Read MoreZero Trust & SOC 2 Compliance: The Significance of Robust Authentication
Organizations can achieve SOC 2 compliance more easily by opting for zero trust solutions, as they prioritize robust, continuous authentication.
Read MoreAI-Powered Identity Authentication Is Here: What You Need To Know
AI can provide more secure authentication by going beyond traditional boundaries & incorporating data context, biometrics, and patterns in user behavior.
Read MoreUnderstanding the Ins & Outs of Cyber Risk Quantification
Introduction In today’s digital world, cyber risk is high and growing. The best way to control this risk is with a proactive cyber security strategy that quantifies and measures your company’s vulnerability to theft, fraud, or data breach. The cyber threat landscape is diverse, and there is a wide range of potential threats in this…
Read MoreHow Does Passwordless Authentication Fit With Zero Trust Security Models?
Will 2023 be the year we finally eliminate passwords? For the last decade, cybersecurity experts have both been pushing for and predicting that a passwordless future is just around the corner. However, while passwords have been declining in recent years in favor of more robust forms of authentication, an entirely passwordless future has yet to…
Read MoreWhy Log4Shell Remains a Major Risk for Corporate Networks.
Log4Shell is Still Lurking. What Does it Mean for Corporate Networks? What is Log4Shell & What Does it Affect? In December 2021, the Log4j vulnerability, also known as Log4Shell, was made public. Log4j is a logging utility for Java that allows developers to output log messages from their applications to various destinations, such as the…
Read MoreWhy Do ZTNA Solutions Fall Short When It Comes to Zero Trust?
ZTNA & Zero Trust Zero Trust is a security architecture in which every individual, inside or outside the organization’s network, must be authenticated, authorized, and continually validated for data security configuration and posture before accessing or maintaining access to information and resources. Zero Trust Network Access (ZTNA) is one of the ways of implementing Zero…
Read MoreWhy Integrated Network Security Architecture is the Future
Integrated network security architecture refers to a unified system of different network security features across a network. It provides a systematic approach to designing and implementing a set of cybersecurity measures that are synergistic and mutually supportive to one another, to provide an increased level of protection. With an integrated network security architecture, you can…
Read MoreThings to Consider When Defending Against a Rogue API
Application programming interfaces (APIs) are a crucial aspect of most businesses. Its responsibility involves the transfer of information between systems within an organization or to external companies. Unfortunately, a rogue API can expose sensitive data and the organization’s internal infrastructure to misuse. A security breach could result in the leaking of sensitive customer data such…
Read MoreCISA’s New Zero Trust Maturity Model: What You Need To Know
Did you know that 74% of IT decision-makers now believe ransomware should be considered a matter of national security? Ransomware threats have skyrocketed in recent years. An eye-watering 60% of organizations fell victim to a ransomware attack last year. Undoubtedly, ransomware is cybersecurity’s most significant challenge today. So, how do organizations fight back and safeguard…
Read More