Part 1 : Zero Trust Network Access (ZTNA)

Overview In a traditional security model assumes that everything on the inside of an organization’s network can be trusted, but given increased attack sophistication and insider threats, new security measures need to be taken to stop them from spreading once inside. Because traditional security models design to protect the perimeter, threats that get inside the... Continue Reading →

How to achieve 72 hours for breach notification

What regulators demanding from organizations? According to Article 33 - EU GDPR - "Notification of a personal data breach to the supervisory authority"; In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data... Continue Reading →

Compliance frameworks for cloud security providers across globe

Many organisations have moved some or all of their IT to the cloud, but it’s resulted in unexpected costs, fragmentation, and a need for more security staff to monitor data, mitigate advanced threats and meet regulatory & compliance requirements. Until few years ago - the mission critical data of an organization will be within walls (data... Continue Reading →

Blog at WordPress.com.

Up ↑

%d bloggers like this: