Waverley Labs Blog
Zero Trust Adoption Will Continue to Lag Until “Dynamic Enforcement” Is Better Understood
Zero Trust continues to be in the news and not for all the right reasons. A recent Deloitte survey with 600 respondents showed that the COVID-19 pandemic has motivated 37% more organizations to increase adoption of Zero Trust than were previously planning to earlier...
Covid Pandemic Driving Growth in Multicloud Environments That Are Still Not Secure
Containers alone are not the answer InfoWorld recently published an article by the renowned cloud expert David Linthicum. In the article Linthicum noted how the Covid pandemic and remote workforce is fueling cloud adoption and then clear described two cloud...
Containers and Kubernetes – a New Opportunity to Build in Security
Software-defined perimeter architecture is key to security “Shifting Left” in CI/CD A recent article in Data Center Knowledge - What Containers and Kubernetes Mean for Colocation Data Centers - described how flexibility associated with containerizing...
DevSecOps Advocates a Shift Left for Security to Achieve Agile ATO
Software-Defined Perimeter provides integrated security controls for ATO A recent GitLab white paper provides an elegant description of DevSecOps and how proactive security integration reduces an agency’s risk and vulnerabilities. It accurately outlines a solution...
Waverley Labs Recognized by Gartner in New Market Guide for Zero Trust Network Access (ZTNA)
Software Defined Perimeter architecture advances Zero Trust from a network-centric strategy to a truly secure solution for mission critical applications Gartner recently published a new Market Guide for Zero Trust Network Access (ZTNA) authored by Analysts Steve...
NIST Demonstrates Zero Trust Solution for Achieving Agile ATO
Software-Defined Perimeter provides integrated security controls for ATO As the proliferation of cloud computing, mobile device use, and the Internet of Things continues to dissolve traditional network boundaries, conventional network perimeters are no longer...
ID Proofing Plus Software-Defined Perimeter Enables ICAM
New DHS AccessID network built on SDP proofs IDs In 2019, OMB issued a new cybersecurity memorandum, M-19-17 – Enabling Mission Delivery through Improved Identity, Credential, and Access Management, setting forth a modernized policy for the federal government’s...
Face it … you can’t trust AWS, Google, Cloudflare and the others
Zero Trust is a strategy. Software Defined Perimeter based on mTLS makes it a true solution Earlier this month there was another high visibility hack that involved malicious hijacking of more than 8,800 internet traffic routes from 200+ networks, and included the...
Network Connection Paradigms at Odds in Emerging DevSecOps Environments
Agile ATO in the Spotlight The industry is grappling with conflicting network connection paradigms as the proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved traditional network boundaries. Authentication of users...
NFV + SDP = Secure Dynamic Access
Significant and rapid increases in global IP traffic and the adoption of mobile devices have challenged network service providers to scale and improve infrastructure. To address this network providers are beginning to embrace new approaches such as Network Function...