ArjunRZero Trust - Networks: “Know the enemy and know yourself”“Know the enemy, know yourself” is perhaps the most well known quote from “Art of War”. In Cybersecurity, focus is given to the first part…Oct 7, 2022Oct 7, 2022
ArjunRZero Trust — Devices: “Do you read me, HAL?”In my previous article on Zero Trust for Applications, I concluded with how we need to focus on ZT approach for code compile/build and for…Apr 29, 2022Apr 29, 2022
ArjunRZero Trust — Applications: “You Hear That Mr. Anderson? That Is The Sound Of Inevitability!”This will be Part 3 of my series of articles on Zero Trust. Applications perhaps receive the least amount of attention when it comes to…Feb 12, 2022Feb 12, 2022
ArjunRZero Trust — Data Security: We live in a twilight world, and there are no friends at duskThis will be Part 2 of my series of articles on Zero Trust. And let's start with data, the "chewy core" of the traditional M&M Information…Jan 18, 2022Jan 18, 2022
ArjunRZero Trust: or How I learned to stop worrying and love “perimeterless security”Zero Trust is a term attributed to Stephen Marsh and mentioned in his ’94 doctoral thesis “Formalising Trust as a a Computational Concept”…Jan 11, 2022Jan 11, 2022
ArjunRYet another article on how Defender-ATP is changing endpoint security…Defender-ATP is by no means a new product to the EDR market. But it does seem like in the last year or two, D-ATP has been making strides…Aug 20, 2019Aug 20, 2019
ArjunRDeploy Azure Privileged Identity ManagementScenario: As part of their cloud-strategy, your organization migrated to Azure on an accelerated timescale. This often meant rules were…Aug 16, 2019Aug 16, 2019
ArjunRYet another Phishing Incident Response playbook…There is no lack of playbooks for managing Phishing emails, but this one focuses on automationAug 14, 20191Aug 14, 20191
ArjunRYet another article on how we suck at cyber-security…It is amazing that in the face of overwhelming evidence, organizations still struggle to comprehend the complexity of cyber-security and…Aug 9, 2019Aug 9, 2019