October 8, 2020
In her piece for The Motley Fool’s The Blueprint, reporter Patricia Staino interviewed our COO, Norm Laudermilch on the current hot-topic of Zero Trust.
A Beginner’s Guide to Zero Trust states that zero-trust security requires all users — both inside and outside your network — to repeatedly “prove” themselves. It could profoundly change SMB cybersecurity in today’s world of remote work. This concept has become increasingly a topic of conversation in security circles as more businesses have moved to a “work from home” model.
Ms. Staino quotes Norm as follows:
“By shifting our focus to a zero-trust model, we treat the majority of corporate devices, including user laptops, departmental networks, printers, and more, as untrusted, and enforce security only around the intellectual property that truly needs to be protected,” says Norm Laudermilch, COO at .
Want to learn more about Zero Trust?
- Managing Multiple IT Security Regulations using Zero Trust Principles [E-Book]
- Managing Multiple Assessments using Zero-Trust Principles [Webinar]
- Performing PCI DSS Assessments using Zero Trust Principles [Webinar]
- How to Manage PCI DSS Compliance using Zero Trust Principles [Blog]