Is Zero Trust Architecture the Method of Future Cybersecurity?

Palo Alto Networks has a Zero trust explanation: “Zero Trust is a strategic initiative that helps prevent successful data breaches by eliminating the concept of trust from an organization’s network architecture. Rooted in the principle of “never trust, always verify,” Zero Trust is designed to protect modern digital environments by leveraging network segmentation, preventing lateral movement, … Read more

Does Cybersecurity enter decision: Cloud or own Servers?

Is it safer/cheaper to run your own computers? Or should you have a cloud based service that manages your IT functions? What characteristics are there in the decision to outsource servers? Or when outsourcing your IT department? Don’t believe that outsourcing your IT servers now removes the risk of a data breach!!  Or if you … Read more

What is the Highest Risk Attack on us Right Now?

Is it Ransomware with a shotgun approach? A shotgun approach means the attackers are sending ransomware attacks to many computers – not picking their targets, only spreading out to whatever computer will answer a certain defense profile. Or ransomware that is targeted to specific industries? Will the ransomware attacker pick on a specific industry that … Read more