Good news ! Hackbusters community is waiting for you !
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at:

Implementing a 'Zero Trust' Approach to Security


Application Security , CISO , Governance

Implementing a 'Zero Trust' Approach to Security Doug Copley of Duo Security on Going Beyond a Focus on the Perimeter Tom Field (SecurityEditor) • July 11, 2018 Doug Copley, advisory CISO, Duo Security

Every application should be protected the same way no matter where it resides, rather than focusing on a "perimeter" approach, says Doug Copley of Duo Security.

See Also: How to Keep Your Endpoints Safe from Cybercrime

In a video interview at Information Security Media Group's recent Chicago Fraud and Breach Prevention Summit, Copley discusses:

How to enforce a "zero trust" model; The importance of multifactor authentication; Taking steps to enforce security on devices the organization does not manage.

Copley is advisory CISO at Duo Security. A former CISO in healthcare and chief privacy officer in financial services, he has 25 years of IT, information security and data privacy experience.

View All Trending Stories