Waverley Labs Blog
Waverley Labs Recognized by Gartner in New Market Guide for Zero Trust Network Access (ZTNA)
Software Defined Perimeter architecture advances Zero Trust from a network-centric strategy to a truly secure solution for mission critical applications Gartner recently published a new Market Guide for Zero Trust Network Access (ZTNA) authored by Analysts Steve...
NIST Demonstrates Zero Trust Solution for Achieving Agile ATO
Software-Defined Perimeter provides integrated security controls for ATO As the proliferation of cloud computing, mobile device use, and the Internet of Things continues to dissolve traditional network boundaries, conventional network perimeters are no longer...
ID Proofing Plus Software-Defined Perimeter Enables ICAM
New DHS AccessID network built on SDP proofs IDs In 2019, OMB issued a new cybersecurity memorandum, M-19-17 – Enabling Mission Delivery through Improved Identity, Credential, and Access Management, setting forth a modernized policy for the federal government’s...
Face it … you can’t trust AWS, Google, Cloudflare and the others
Zero Trust is a strategy. Software Defined Perimeter based on mTLS makes it a true solution Earlier this month there was another high visibility hack that involved malicious hijacking of more than 8,800 internet traffic routes from 200+ networks, and included the...
Network Connection Paradigms at Odds in Emerging DevSecOps Environments
Agile ATO in the Spotlight The industry is grappling with conflicting network connection paradigms as the proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved traditional network boundaries. Authentication of users...
NFV + SDP = Secure Dynamic Access
Significant and rapid increases in global IP traffic and the adoption of mobile devices have challenged network service providers to scale and improve infrastructure. To address this network providers are beginning to embrace new approaches such as Network Function...
What ever happened to the Agile ATO?
Nearly two years ago, Federal agencies began embracing a shift to agile development methodologies—releasing projects in stages to get user feedback and rectify bugs early in the process and continuing to iterate and improve over time. A key challenge however was the...
Can Kubernetes in an F-16 Warfighter Jet Be a Secure Environment?
Zero Trust does not equate to Zero Risk As part of its work on the Defense Department's Enterprise DevSecOps Initiative, the Air Force is increasingly deploying solutions like Kubernetes, the open-source platform for managing containerized workloads and...
DevOps environments becoming new target for attack
Software-defined perimeter (the most advanced zero trust implementation) shows promise. Kubertnetes, Red Hat OpenShift, are you listening? DevOps teams continue to increase use of virtualization – be it virtualizing[1] operating systems or containerizing[2]...
Zero Trust Orchestration – A New Cyber Security Paradigm
Zero Trust is a catchphrase that is growing in use and is employed by cyber security product and service vendors to promote their offerings. Zero Trust, as the concept implies, requires that users aren’t allowed any access to anything until they can prove who they...