-
26.2.2020
Zero Trust eXtended framework (and how to establish it with Cisco’s solutions)
Author: Stojan Rančić
Learn how to limit unauthorized network and data access by leveraging the Zero Trust Architecture principles - a continuous endpoint authentication and authorization for your IT environment using Cisco technologies.
-
20.11.2019
Rise of Mobile Threats and MTD
Author: Leszek Twardowski
Learn how to protect your mobile device if it is offline and how to defend against mobile attacks including phishing, hacking, credential theft and more.
-
19.11.2019
Introducing a Mobile-centric Approach to Zero Trust
Author: Claus Nussbaum
Zero Trust in Mobile Environments and MobileIron Roadmap.