Remove Architecture Remove CSO Remove Technology
article thumbnail

BrandPost: Network Security and the Heart of a Zero Trust Architecture

CSO Magazine

A network that is intended to never trust, and to always verify all connections, requires technology that can determine confidence and authorize connections and provide that future transactions remain valid.

article thumbnail

CSO of the Year | Dan Meacham helps Legendary Entertainment’s movie magic live safely in the cloud

SC Magazine

Dan Meacham is chief information security officer and CSO with Legendary Entertainment, the production company behind Godzilla vs. Kong and other popular films such as The Dark Knight and Jurassic World. Meacham’s architecture allowed the company to ensure the secure editing of projects anywhere in the world via the cloud.

CSO 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7 tenets of zero trust explained

CSO Magazine

For that reason, the National Institute of Standards and Technology (NIST) published NIST SP 800-207 Zero Trust Architecture , which describes the following seven tenets of zero trust. While there is no single definition of zero trust, it helps to have a shared understanding of a concept.

article thumbnail

SASE is coming, but adoption will be slow (especially for large enterprises)

CSO Magazine

The adoption of edge computing and cloud infrastructure over the past decade combined with the recent surge in remote work, have seriously challenged traditional network architectures and security models.

article thumbnail

NIST's new devsecops guidance to aid transition to cloud-native apps

CSO Magazine

The United States federal government, much like in industry, is moving toward cloud adoption, Devsecops and microservices-based architectures for cloud-native applications. The National Institute of Standards of Technology (NIST) is tasked with promoting innovation and providing standards and guidance to industry to facilitate best practices.

article thumbnail

BrandPost: Is a Zero Trust or Security Service Edge (SSE) better? Or should both be used?

CSO Magazine

This is true; Zero Trust is a new way of security thinking that permeates several areas, not just architecture or technology. Once deployed, this technology provides secure access for users, things, and workloads to public or private destinations based on Zero Trust principles. To read this article in full, please click here

article thumbnail

5 top deception tools and how they ensnare attackers

CSO Magazine

It's one reason why zero-trust architectures get so much attention nowadays, and it's why more enterprises have threat hunters who go on the lookout for attackers that are already active on their networks. More are turning to active defense, or deception technologies, to help identify attacker movement within their systems.