top of page
BLOG
Search


Microsoft Visual Basic, Excel Scripting, & Their Cybersecurity Implications: An In-Depth Discussion
Discover the dangers of Microsoft Visual Basic & Excel scripting, and learn preventive measures and the role of Zero Trust in my latest blog

Michael Friedrich
Oct 26, 20234 min read


Why the device and Zero Trust are Crucial Role in Fostering a Secure User-Data Relationship
ZeroTrust should move from a static construct into an ongoing process of validation and verification.

Michael Friedrich
Sep 14, 20233 min read


Unmasking Cyber Threats: Zero Trust's Resolute Shield Against QR Code Phishing and VPN Vulnerability
Explore Zero Trust's role in countering QR code phishing and VPN vulnerabilities, safeguarding your digital landscape effectively.

Michael Friedrich
Aug 17, 20233 min read


The Case for Tokenization of Data In Zero Trust
Secure data with tokenization—a technique that replaces sensitive information with tokens, reducing risk and strengthening protection.

Michael Friedrich
Jul 12, 20233 min read


The CATO Security Framework
Discover how the federal government is tackling an unprecedented cybersecurity challenge with Continuous Authority to Operate (CATO).

Michael Friedrich
Jul 5, 20233 min read


Zero Trust Security 2.0 and 800-207
In this blog, I discuss some of the differences between two publicized government ZT frameworks agencies are working with.

Michael Friedrich
May 11, 20233 min read
bottom of page