Fundamentals

The Identity Catechism: Questions every CISO should ask of their Identity program

The evolution is underway. Our infrastructures are borderless, our critical data is cloud-based, and our users work from anyplace on the globe – or 36,000 feet above it. Our legacy controls are as outdated as the conceptual hardened perimeter and our users are still human; and will still succumb to the (not so) well-crafted phish.

privacy enclaves

POA: Ensuring Privacy through Secure Enclaves

The very first piece I had published was in 2002 for a Privacy Officers newsletter discussing how secure enclaves would be beneficial to the privacy effort. Ensuring Privacy through Secure Enclaves: Secure Architecture Designs that Enable Privacy For years, security experts have been evangelizing the benefit of replacing the monolithic “goeverywhere-and-do-everything” network paradigm with one that