How do you build a zero trust model
A zero trust model is a security concept in which access to resources is granted only after verifying the identity of the user or device requesting access. So, what are the steps to building a zero trust model?
Abu Sadeq is currently the Founder and CEO at Zartech where his mission is to empower organizations to obtain greater cybersecurity maturity. Abu is a certified Chief Information Security Officer (C|CISO) and has a Master of Science degree in Management Information Systems from the University of Texas at Dallas. He has diverse industry experience in Aerospace & Defense, Chemical, Telecom, Healthcare, Oil & Gas, and Consumer Goods. Abu has extensive experience in creating strategies and plans that define IT/Security operational excellence. Abu is also the creator of Cyberator® a sophisticated cybersecurity, governance, risk, and compliance solution.
A zero trust model is a security concept in which access to resources is granted only after verifying the identity of the user or device requesting access. So, what are the steps to building a zero trust model?
The increasing use of artificial intelligence and machine learning in cybersecurity and the potential benefits and risks associated with these technologies
The rise of ransomware attacks and how organizations can protect themselves from falling victim to these types of cyber threats
The impact of a major cyber-attack to an organization’s brand, reputation, and business operations can be catastrophic. Weaknesses in information security can jeopardize your mission, threaten your profitability, and invite fines and penalties from regulatory bodies.
Top Six Cybersecurity Tips for Small to Mid-sized Businesses
HP recently announced the findings of two new reports titled “Rebellions & Rejection” and “Blurred Lines & Blindspots” – comprehensive global studies assessing organizational cyber risk in an era of remote work. The global pandemic… Read More »New report on remote working finds alarming security issues
Social engineering, in the context of information security, is the art of manipulating people so they give up confidential information. This is a type of confidence trick for the purpose of vital information gathering. It… Read More »Social Engineering Attacks and How You Can Protect Yourself
I’ve always been a big fan of TED (Technology, Entertainment, Design) Talks. If you’ve never watched a TED Talk before, you are missing out on one of the most creatively-stimulating, informational series available today. I’ve… Read More »The 6 Ted Talks every leader should watch
Continuation from part 1 The cybersecurity industry has fed and, to a large extent, continues to feed off fearmongering. As a result, organizations are spending millions of dollars on shiny security products that are not… Read More »How to build your security strategy and roadmap: Part 2
Since the advent of the internet, businesses of all sorts, sizes, and locations have tried to explore new and larger markets to capture. It has provided them with new opportunities for which they work competently,… Read More »How to build your security strategy and roadmap: Part 1