Explained: the strengths and weaknesses of the Zero Trust model

Credit to Author: Pieter Arntz| Date: Tue, 28 Jan 2020 16:00:00 +0000

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Categories:

Tags:

(Read more…)

The post Explained: the strengths and weaknesses of the Zero Trust model appeared first on Malwarebytes Labs.

Read more

Making the case: How to get the board to invest in higher education cybersecurity

Credit to Author: Joan Goodchild| Date: Wed, 28 Aug 2019 17:31:00 +0000

CISOs working in institutions of higher learning have their own considerations when communicating with the board about risk management. One of the top security officials at Boston College offers his takeaway on what it takes to get board buy-in on campus.

Categories:

Tags:

(Read more…)

The post Making the case: How to get the board to invest in higher education cybersecurity appeared first on Malwarebytes Labs.

Read more