Change Management for Zero Trust
By Andy Ruth, of Sustainable Evolution Change management isn’t any different for Zero Trust than it is for any other big initiative. But most of us aren’t very good at change management. And security and […]
Aggregated enterprise architecture wisdom
By Andy Ruth, of Sustainable Evolution Change management isn’t any different for Zero Trust than it is for any other big initiative. But most of us aren’t very good at change management. And security and […]
The Open Group, the vendor-neutral technology standards organization, is hosting its upcoming event October 30 – November 2, 2023 in Houston, Texas. The event brings together experts, government officials, industry leaders, and experienced pract…
The recent Chief Architect Forum (CAF), a gathering of some of the world’s leading IT architects, was a rousing success for the global IT architect community. To learn more about what made this event so […]
By Andy Ruth, Notable Architect Increasing automation and using change management techniques can help you integrate a Zero Trust strategy into a function SecOps environment. Some keys to modeling this workstream: · Start by creating […]
By Andy Mills The Application Programming Interface (API) is now the bedrock of our digital ecosystem, acting as the glue between systems and applications and enabling businesses to rapidly deliver services. However, APIs are frequently […]
By Andy Ruth, Notable Architect (Part 1 appeared Tuesday here.) As you are modeling a Zero Trust initiative into workstreams, a logical separation is by access control and asset protection. Access control is focused on the […]
By Andy Ruth, Notable Architect As you are modeling a Zero Trust initiative into workstreams, a logical separation is by access control and asset protection. Access control is focused on the request, so identity, device, […]
By Phil Robinson, Principal Security Consultant, Prism Infosec The concept of Zero Trust is “never trust, always verify” so that in a Zero Trust Architecture (ZTA) every access request is regarded as potentially hostile and […]
Forrester originated the Zero Trust Model over a decade ago and defines Zero Trust as: An information security model that denies access to applications and data by default. Threat prevention is achieved by only granting access to networks and workloads…
I have a good friend that has a small business (roughly 100 employees and 2 office locations, everything lives in the cloud, no real “network” to speak of) that is doing well. A few weeks ago, over barbeque and range time (some folks play golf, we sho…
I am a huge fan of Zero Trust—the simplicity of the concept resonates with clients that read the research authored previously by John Kindervag and more recently myself. The framework’s intrinsic value to security and business processes is readily evid…