top of page
BLOG
Search


Why the device and Zero Trust are Crucial Role in Fostering a Secure User-Data Relationship
ZeroTrust should move from a static construct into an ongoing process of validation and verification.

Michael Friedrich
Sep 14, 20233 min read


A Discussion On Code Signing and Zero-Trust
Traditional cybersecurity exposed. Learn how Zero Trust's micro-segmentation could have stopped the VPN provider attack.

Michael Friedrich
Sep 7, 20233 min read


The Case for Tokenization of Data In Zero Trust
Secure data with tokenization—a technique that replaces sensitive information with tokens, reducing risk and strengthening protection.

Michael Friedrich
Jul 12, 20233 min read


COVID-19 and Cybersecurity: The WFM Revolution
The outbreak of COVID-19 sent shockwaves through societies worldwide, forcing companies to adapt to remote work arrangements.

Michael Friedrich
Jun 2, 20233 min read


The Role of Artificial Intelligence in Cybersecurity
Artificial Intelligence (AI) has become increasingly popular in recent years and has found its way into various industries.

Michael Friedrich
May 18, 20234 min read


Zero Trust Security 2.0 and 800-207
In this blog, I discuss some of the differences between two publicized government ZT frameworks agencies are working with.

Michael Friedrich
May 11, 20233 min read
bottom of page