Cloud 101CircleEventsBlog

Announcements

Announcements
Using Zero Trust to Mitigate Ransomware Threats
Using Zero Trust to Mitigate Ransomware Threats

Ransomware continues to have a significant impact on enterprises, and shows no signs of abating. Zero Trust securi...

January 5, 2023

Zero Trust Training Mind Map
Zero Trust Training Mind Map

The Zero Trust Training (ZTT) mind map displays the eight areas of zero trust knowledge that CSA’s ZTT will cover ...

October 10, 2022

Zero Trust Training Curriculum Overview
Zero Trust Training Curriculum Overview

Building on the foundational principle of Zero Trust that no part of a computing and networking system can be impl...

October 10, 2022

CISO Perspectives and Progress in Deploying Zero Trust
CISO Perspectives and Progress in Deploying Zero Trust

 Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the pe...

June 6, 2022

Software-Defined Perimeter (SDP) Specification v2.0
Software-Defined Perimeter (SDP) Specification v2.0

SDP architecture is an effective way to implement the principles of Zero Trust. 

March 11, 2022

CxO Panel: Enabling Pervasive Zero Trust
CxO Panel: Enabling Pervasive Zero Trust

CEOs from key industry leaders discuss the importance of Zero Trust.

March 8, 2022

Towards a Zero Trust Architecture | CSA
Towards a Zero Trust Architecture | CSA

Learn how the industry can accelerate adoption of Zero Trust.

March 8, 2022

Moving the U.S. Government Toward Zero Trust Cybersecurity Principles
Moving the U.S. Government Toward Zero Trust Cybersecurity Principles

Executive Order 14028, “Improving the Nation’s Cybersecurity”, pushes agencies to adopt zero trust cybersecurity p...

March 8, 2022

NIST Special Publication (SP) 800-207, Zero Trust Architecture
NIST Special Publication (SP) 800-207, Zero Trust Architecture

This document contains an abstract definition of zero trust architecture and gives general deployment models...

March 8, 2022