Lacking necessary visibility and internal enforcement capabilities, traditional perimeter security couldn’t distinguish between what was in scope and what wasn’t, so made it impossible for businesses to remain truly compliant. Micro-segmentation using the Zero Trust model provides visibility and allows you to enforce tight controls on data that is in scope, and retain flexibility and visibility over your heterogeneous environment as a whole.
About Dave Klein
Dave Klein is the Senior Director of Technical Evangelism for Guardicore. With more than 21 years of real-world cybersecurity experience he works with Guardicore teams, customers and industry thought leaders to address the challenges of securing modern hybrid cloud environments. Dave has spoken on a wide variety of cybersecurity topics including micro-segmentation, crytpojacking, hybrid cloud adoption, PCI compliance, stages of the cyber security kill chain, interactions between the physical and cyber worlds as it relates to the radicalization and arming of domestic terrorists, and using cyber forensics in real world criminal cases.
Entries by Dave Klein
“Never trust, always verify.” But, how can you verify what you can’t see? A strong zero trust model starts with an intuitive and accurate map of your entire data center, updated in real time and with valuable business context and grouping. If you’re thinking about Zero Trust for your enterprise, here’s where it begins.
Hybrid and multi cloud ecosystems need converged, simplified security that works seamlessly and parallels an automated provisioning model. Understanding the shared responsibility model used by cloud providers, as well as how to achieve best in class visibility and control, and the effect of compliance and cloud-native environments can help you make a smart security choice for your unique business context.
Looking at the data center breaches that have the most tangible consequences, huge enterprises like Yahoo, Marriott, and Target have lost billions of dollars and taken a huge hit to their customer trust. Could they have prevented these data center breaches by fixing some simple security vulnerabilities?
Today’s breaches are often headline news, but that doesn’t mean they weren’t preventable. In fact, a few easy changes could strengthen own security posture, harden your data center from within, and stop your enterprise from becoming an easy target for hackers.
Cloud vulnerabilities, spear phishing, Layer 7 DDoS attacks, fileless malware and more. Learning from the growing cyber threats and attack trends to look out for in 2019 can help you improve your security posture for the year ahead.
The consequences of non-compliance with regulations such as PCI-DSS and HIPAA are increasingly serious, while achieving compliance is only becoming more difficult because of dynamic workloads and hybrid IT environments. How can micro-segmentation make compliance easy again?
Any business that works with payment data recognizes the challenges involved with sustainable compliance. PCI regulations change as the industry learns more about security and as wider threats evolve. Learn how you can bring your organization on board for sustainable compliance, using the right security tools and correctly managing an ongoing project.
The movement of data and workloads to the cloud has been more like a headlong rush. In the quest for a competitive edge, businesses are clearly eager to take advantage of the agility and elasticity the cloud affords them – so much so that security is often an afterthought.
Micro-segmentation is very achievable. While it can feel daunting, you can succeed by proactively being aware of and avoiding these roadblocks.