article thumbnail

CSO of the Year | Dan Meacham helps Legendary Entertainment’s movie magic live safely in the cloud

SC Magazine

Dan Meacham is chief information security officer and CSO with Legendary Entertainment, the production company behind Godzilla vs. Kong and other popular films such as The Dark Knight and Jurassic World. If they can pass this authentication process, then they don’t even need a password to log in. Legendary Entertainment).

CSO 69
article thumbnail

BrandPost: Network Security and the Heart of a Zero Trust Architecture

CSO Magazine

As part of a Zero Trust approach to cybersecurity, network flows should be authenticated before being processed and access determined by dynamic policy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Auth0’s OpenFGA explained: Open source universal authorization

CSO Magazine

Auth0’s OpenFGA project is an open source effort that undertakes to provide a universal authentication solution. Authentication vs. authorization. Authentication is concerned with who and authorization with what. Authentication is concerned with who and authorization with what.

article thumbnail

Axis Security releases security service edge offering Atmos

CSO Magazine

Axis Security, a security service provider focused on zero trust , has launched Atmos, a cloud-native alternative to data center based, legacy network architectures and security service edge (SSE) platforms.

article thumbnail

The Nature of Cybersecurity Defense: Pentagon To Reveal Updated Zero-Trust Cybersecurity Strategy & Guidelines

CyberSecurity Insiders

In order to achieve Zero Trust, application security and API security can’t be left out of the equation; shares Richard Bird, CSO, of Traceable AI. The Proper Authentication of Digital Assets. That’s why authorization is a critical aspect of zero-trust architecture. Zero Trust without API security is simply, not Zero Trust.

article thumbnail

Auditing the IRS: Asset Management Problems Causing Cybersecurity Risks

SecureWorld News

Aflac CSO Tim Callahan told us as much after his keynote at a SecureWorld conference last year. We do have a little bit of a benefit, because we've established a protocol where no device can touch our environment, or authenticate our environment, if it doesn't have one of our security certificates on it. Asset management is difficult.

Risk 90
article thumbnail

How to build a zero trust ecosystem

SC Magazine

My experience implementing Zero Trust has shown me that, while the process to implement a complete architecture takes time, the transformation is worth the effort and the benefits will be realized throughout the journey. James Carder, LogRhythm CSO. What is Zero Trust?

CISO 134