Skip to content
Menu
menu

Zero Trust

Why Zero Trust Must Extend into Deep Infrastructure

Most organizations' focus on tightening security starts with heightening identity access management at the perimeter and graduates to following established best practices that span across applications, data, networks, and the cloud.

This begs the questions: What’s next? To where should you turn your attention? The fact is serious, persistent threats are already looming in your infrastructure. The lowest-hanging fruit—and the most vulnerable point of attack—is where you may least expect it: the hardware and firmware that lies in the deep layers of your physical infrastructure.

Read the Article

Related: Five Tools to Drive Cyber Success

Recommended: Uptime at Any Cost: Why Cyberactors Increasingly Targeted Manufacturing in 2021

Featured Articles

Security Technology: Big Changes on Campus

While students, teachers, employees, and staff head back to campus, the facilities they're returning to and the threat environment around them have changed. The August issue of Security Technology examines these changes, steps security practitioners are taking to mitigate evolving risks, and the technology they're embracing to address campus vulnerabilities.

Spotlight on Supply Chain Security

Semiconductor Slowdown

A global semiconductor shortage is stalling production at every level—including the security technology supply chain that relies on overseas partners.

Security Management Podcast

August 2022: Privacy Debates on College Campuses, Plus Security Career Change Guidance

The use of technology on college campuses is expanding faster ever before, but that doesn’t mean that stakeholders’ expectations of privacy have shrunk. Michael Sink joins SM Highlights host Chuck Harold to talk campus security and privacy. Also in this episode, sponsored by RaySecur, Will Plummer discusses mailroom security and last mile threats, and Shelly Kozacek, CPP, shares guidance for security career switches and mapping a professional trajectory that works for you.

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: Code Black: 50 Lessons in Crisis Management for Effective Leadership

Book review: Code Black

Featured in the July/August Issue

Code Black discusses fundamentals of crisis management, security management, risk management, and how businesses and government agencies deal with conflict in today’s turbulent times.

Catch Up With SM on Social Media

Be the first to hear about new SM articles, issues, videos, and more on Twitter.
Share the latest SM articles, infographics, and stories with your friends and colleagues.
Get more award-winning security content in your search results by following us on Google News.

Fast Facts:
Profiting Off Pangolins

 

Security Management News Feeds

;
record_voice_over

Podcasts

Hear what Security Management editors and guest speakers have to say about this month’s magazine.

cast_for_education

Webinars

View all of our past and upcoming educational webinars.

cloud_download

Download

ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.

arrow_upward