Switching from a “Just in Time” delivery system should include planning ahead

Switching from software defined perimeters, like those used in “Just in Time” networks, will require planning ahead to combat the future after coronavirus.

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Read more

Select your language