Remove tags cisco-zero-trust
article thumbnail

TrustSec Policy Analytics – Part One: What are policy analytics?

Cisco Security

Why all the buzz around pursuing group-based policy management to achieve zero trust? Adopting zero-trust initiatives and best practices is all the rage. Simply put, applying “never trust; always verify” to anyone and any device attempting to access an enterprise network is a no-brainer nowadays. And rightly so.

article thumbnail

What’s New in the Federal Zero Trust Strategy?

Duo's Security Blog

So it was good to see that in response to last May’s Executive Order 14028 , the Office of Management and Budget (OMB) released a memo Wednesday outlining a new strategy for moving the federal government toward a zero trust cybersecurity posture. Check out Lindsey O’Donnell-Welch’s coverage of the news in Decipher.) What’s the Vision?

article thumbnail

Black Hat Asia 2022: Building the Network

Cisco Security

In part one of this issue of our Black Hat Asia NOC blog, you will find: . To accomplish this undertaking in a few weeks’ time, after the conference had a green light with the new COVID protocols, Cisco Meraki and Cisco Secure leadership gave their full support to send the necessary hardware, software licenses and staff to Singapore.