How to Implement Zero Trust in Mobile Security

How to Implement Zero Trust in Mobile Security

Zero Trust. This security architecture concept, and naming mechanism, originated in 2010. It was introduced by a principal analyst at Forrester, John Kindervag. The following definition of Zero Trust, published by CSO, summarizes it as: “…a security concept...
Protecting Corporate Data from Malicious Apps

Protecting Corporate Data from Malicious Apps

Corporate security teams are responsible for an expanding attack surface due to increased flexibility in where employees work from. Most organizations that primarily employ knowledge workers, traditionally operated out of corporate offices prior to the onset of the...