A Culinary Journey through Cybersecurity Excellence

A Culinary Journey through Cybersecurity Excellence

In the current ever-changing landscape of cybersecurity, where every byte of information is a battleground and every network breach a potential catastrophe, fostering strong connections among industry experts becomes paramount. One company is not only at the forefront...
Outsourcing Operations

Outsourcing Operations

All through school we are told to work on our weaknesses. While this sound like great advice, there are thought leaders out there that would disagree with this adage. The efforts of schools are to make sure that you are not utterly deficient in a foundational skill....
ZTA – A Jungian approach

ZTA – A Jungian approach

In my experience in defining, designing, and implementing Zero Trust Architectures, I have come to the conclusion that every deployment has its own unique personality.What this looks like in practice is that there is an art to ZTA that is not completely understood by...