The Untrusting Eight: NCSC’s Zero Trust Principles
16 April 2021
When deploying the zero trust model, it’s important not to look at the whole and deem it too big. Almost every enterprise has some of the ingredients available. If you consider it a journey of many steps, it is thoroughly achievable, no matter what size enterprise you are. But understanding where you are with zero trust is essential when building a plan to deploy it.
The NCSCs 8 Zero Trust principles help you focus your efforts when designing and deploying a zero trust architecture. How many can you tick off?
Learn more on Zero Trust by joining us April 29 from 11 am as we explore the true realities of Zero Trust; we’ll look at common approaches, including practical steps you can take now and our views on the operational side of it all. Register here.
Explore what zero trust really is from both an analyst and common view, we’ll look at common approaches, including practical steps you can take now to start the journey, and share our views on the operational side of it all.
A vulnerability found in Pulse Secure VPN appliances has been exploited impacting Government and Financial organisations. Read our advisory.
EDR/NDR/XDR – It’s time we explained the differences, removed the fog, and identified the gaps and, therefore, the blind spots.