top of page
Blog Hub
3 min read
Step by Step process to Implementing a Zero Trust Architecture
The steps involved in a Zero Trust planning and implementation project, including examples: 1. Data Inventory and Stakeholder Engagement:...
3 min read
Case study on ZTNA (Zero Trust Network Access)
ZTNA to the Rescue: Boosting Security at Retail Express. Retail Express, a rapidly growing clothing retailer, faced challenges with...
2 min read
Are there any regulations that require zero trust?
While Zero Trust architecture is not explicitly mandated by regulations, its principles align with industry-specific regulations,...
3 min read
Case study on Zero Trust - IOT
Securing a Smart City with Zero Trust: Traffic Light Management Example Imagine a smart city where traffic lights dynamically adjust...
2 min read
Does AWS use Zero Trust?
Yes, AWS incorporates Zero Trust principles into its services and infrastructure. While not a single, monolithic service, AWS offers...
1 min read
Does NIS 2 Directive expect implementing Zero Trust?
The NIS 2 Directive doesn't explicitly mandate Zero Trust as a requirement. However, it strongly encourages it as a key element for...
2 min read
Example of inside out and outside in and why does Zero Trust prefer inside out?
Inside-Out Approach: Imagine a team of developers tasked with building an e-commerce platform using the inside-out approach. They start...
2 min read
Success Criteria for Zero Trust Projects
NIST guides Zero Trust initiatives, aiming for reduced incidents, improved access control, compliance, user awareness, and...
2 min read
Does NIST expect implementing Zero trust?
NIST offers guidance for Zero Trust through SP 800-207, the CISA Zero Trust Maturity Model, and alignment with the Cybersecurity...
bottom of page