Posts by Scott Alldridge
Cloud Security and Identity Management
How CASB, IAM, and Zero Trust Work Together to Protect Your Organization Cloud environments have unlocked unprecedented flexibility and power for businesses. However, with great power comes great complexity. The rise of multi-cloud and hybrid strategies has added even more layers of complexity, with countless services, applications, and data points scattered across various platforms. Managing…
Read MoreHow to Implement Zero Trust Pragmatically
When implementing Zero Trust in today’s cybersecurity landscape, it’s easy to become entangled in the complex strategies and advanced technologies that often dominate the conversation. While the latest methods, like Zero Trust, play a crucial role, it’s essential to recognize that they are just one piece of a much larger cybersecurity puzzle. Drawing from the…
Read MoreThe Case for Niche Cloud Providers: How Smaller Data Centers Offer Superior Cybersecurity
In recent years, the migration to cloud services has accelerated, driven by the promise of scalability, flexibility, and cost-effectiveness. Google Cloud, one of the largest cloud providers, has been at the forefront of this revolution. However, a recent incident has highlighted a critical issue with relying on such large providers: the inherent risk of massive…
Read MoreZero Trust Computing
What is Zero Trust Security Practices? -Zero Trust was first coined by Forrester Research analyst John Kindervag in 2010 as the trust model at the time was broken and the only solution was to remove the idea of trusted internal networks and untrusted external networks. Instead, Forrester presented the idea that all network traffic must…
Read MoreIs your Cybersecurity posture ready for remote workers?
Shifting operations to a work from home (WFH) model introduces new cybersecurity considerations to your company/organization. Use this checklist to get ahead—and stay ahead—of new risks. Instigate a cybersecurity health checkup during and after the shift to WFH. Review all cybersecurity controls to identify gaps, prioritize, and remediate accordingly. Update your Technology & Data Use…
Read More