Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources
  • Support

security engineering

Software Developers and Security

25th July 201925th July 2019 peterglock

Metaphorically looking over the shoulder of the developer making “Tut,tut” noises isn’t the way to do this. The ‘cost’ of writing non-secure code needs to go up for developers. Security […]

 Bruce Schneier, Opinion, security engineering, software liability, vulnerabilities  Glock Takes Stock

Recent Posts

  • Ambit, Inc. Announces the Release of AmbitVPN’s Post-Quantum Native Windows Application
  • Zero trust: The good, the bad and the ugly
  • New Cring ransomware hits unpatched Fortinet VPN devices
  • Gigaset Android phones infected by malware via hacked update server
  • SAP warns of malicious activity targeting unpatched systems

Get in touch

Email: [email protected]


View Glock Enterprises Ltd profile on Ariba Discovery

Data Protection Register

Registered with the ICO: ZA494319

About

Glock Enterprises Ltd. Registered in England & Wales No. 11183883

VAT No: GB 361 2795 89

Glock Enterprises (Europe) OÜ
Registered in Estonia
No. 16149069

VAT No: EE102351110

All content (c) Glock Enterprises Ltd 2021

Pages

  • Blog
  • Privacy Policy
  • Resources
    • Free Trial – Private Threat Intelligence
    • White Paper: Building a Business Case for Cybersecurity Asset Management
    • White Paper: Cyber Deception – Migrating to an alternative platform
    • White Paper: Hunting for Threats in Operational Technology
    • White Paper: Internet Connected Storage
    • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
    • Whitepaper: Coping with a flood of Data Subject Access Requests
  • Services
  • Support
  • Welcome

The Latest from Facebook

Glock Enterprises Ltd

3 days ago

Glock Enterprises Ltd
buff.ly/3uySeQkZero trust: The good, the bad and the uglyWe saw a lot of “Cloud Washing” when timeshare morphed via ASP to Cloud. I’ve seen disk drives marketed as “My Cloud” which kind of misses the point...:[...] The bad side of zero trust concerns the misunderstandings that are currently being propagated. "Among the misconceptions Kindervag is eager to dispel is that zero trust makes a system 'trusted,' and that it is just about identity and multi-factor authentication (MFA)," mentioned Zorz. "Zero trust eliminates trust from digital systems, because trust is a vulnerability that can be exploited."If Zero Trust was equal to MFA (as many vendors claim), then neither the Snowden nor Manning breaches would have been able to happen," explained Kindervag. "They had very robust MFA and identity solutions, but no one looked at their packets post-authentication."Something else that Kindervag finds disconcerting is that vendors are redefining the meaning of zero trust so that it coincides with what their products are capable of doing. According to Kindervag, there are no "zero trust products." He told Zorz, "There are products that work well in zero trust environments, but if a vendor comes in to sell you their 'zero trust' product, that's a pretty good indication that they don't understand the concept."[...]Original article ... See MoreSee Less

Photo

View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

Proudly powered by WordPress | Theme: Moesia by aThemes