13 Sep 2021

Zero Trust Will Yield Zero Results Without A Risk Analysis

Over the past four years there has been an avalanche of new Zero Trust products. However during the same period there has been no measurable reduction in cyber breaches. To the contrary, ransomware, data exfiltration and lateral moving malware attacks seem to be increasing. If the emergence of Zero Trust was supposed to make us safer, it hasn’t happened. One of the common mistakes we see enterprises IT leaders and many cybersecurity experts make is to think of Zero Trust as a product. it is not.  Zero Trust is a concept where an organization has Zero Trust in a specific individual, supplier or technology that is the source of their cyber risk. One needs to have Zero Trust in something and then act to neutralize that risk. Thus buying a Zero Trust product makes no sense unless it is deployed as a countermeasure to specific cyber risk. Buying products should be the last step taken not the first.

To help enterprises benefit from Zero Trust concepts here is a modified OODA loop type process to guide your strategy development and execution.

Read More
07 Jun 2021

The New Enterprise Architecture Is Zero Trust

Enterprise technologists use the term “Zero Trust” to describe an evolving set of cybersecurity approaches that move defenses from static attempts to block adversaries to more comprehensive measures that improve enterprise performance while improving security. When the approaches of Zero Trust are applied to an enterprise infrastructure and workflows, the cost of security can be better managed and the delivery of functionality to end users increased. Security resources are matched to risk. Functionality, security and productivity all go up.

Read More
04 Jun 2021

Junaid Islam on Zero Trust Architecture

In this OODAcast we provide insights into Zero Trust architectures from an experienced practitioner, Junaid Islam. Junaid is a senior partner at OODA. He has over 30 years of experience in secure communications and the design and operations of highly functional enterprise architectures. He founded Bivio Networks, maker of the first gigabyte speed general purpose networking device in history, and Vidder, a pioneer in the concept of Software Defined Networking. Vidder was acquired by Verizon to provide Zero Trust capability for their 5G network. Junaid has supported many US national security missions from Operation Desert Shield to investigating state-sponsored cyberattacks. He has also led the development of many network protocols including Multi-Level Precedence and Preemption (MLPP), MPLS priority queuing, Mobile IPv6 for Network Centric Warfare and Software Defined Perimeter for Zero Trust. Recently Junaid developed the first interference-aware routing algorithm for NASA’s upcoming Lunar mission.

Read More
05 Feb 2020

Why many security pros lack confidence in their implementation of Zero Trust

Zero Trust has been deemed a necessary security approach to combat cyber threats and is a system in which an organization or country trusts nobody and nothing internally and externally when granting access to data or assets. All types of access must be verified and authorized before gaining access to

Read More
05 Feb 2020

HPE Acquires Identity Management Firm Scytale

Hewlett Packard Enterprise (HPE) announced on Monday that it had acquired an identity management startup named Scytale. Scytale was launched in 2017 and specializes in cloud-native security and zero trust networking. Scytale is the company that created Secure Production Identity Framework for Everyone (SPIFFE), which is a set of open-source

Read More