Enterprise Security, Platform Security, Software Security

Optimizing Your Zero Trust Environment for Secure Video Conferencing

July 4, 2023

Optimizing Your Zero Trust Environment for Secure Video Conferencing
We’ve all heard the buzz around the virtual water cooler that Zero Trust Architectures are The Next Big Thing in network security, but what do we really know about them? And, perhaps more relevant to our discussion today, why should you care?

This white paper looks at how and why Zero Trust (ZT) defines a data-centric security model and what that means in a real-time production environment. We build on that conversation to take a deeper look at how Pexip's video conferencing platform integrates with your existing ZT strategy and can even give you some new ZT concept ideas to consider.

Spotlight

First Base Technologies

Founded in 1989, First Base Technologies is a leading boutique cyber security testing, consulting and training services provider. Almost three decades in the security business, dealing with all manner of clients, gives us a unique perspective on the cyber security space. That perspective, coupled with continuous monitoring and analysis of emerging technologies and cyber threats, enables First Base to constantly innovate and adapt; creating new services and evolving existing services to ensure our increasing success in the 21st century cyber security landscape. First Base prides itself on being ethical, pragmatic and professional, delivering quality services on time and within budget. The independence of our advice is guaranteed, since we have no ongoing commercial involvement in product sales or installation.

OTHER WHITEPAPERS
news image

Revolutionizing cybersecurity

whitePaper | October 31, 2021

FINX, a platform established since 2018 that is enabled by blockchain technology to create the world’s 1st comprehensive decentralized banking platform. FINX aspires to resolve the problem of high banking costs imposed by conventional banks and serve the unbanked market in Southeast Asia.

Read More
news image

Cisco Secure and the NIST Cybersecurity Framework

whitePaper | December 6, 2022

Cybersecurity can seem overwhelming, and there’s plenty of long to-do lists. The Center for Internet Security (CIS) has the Critical Security Controls, the International Organization for Standardization (ISO) has its 27000-series publications, and ISACA manages its COBIT 5 framework. Layer those atop compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach Bliley Act (GLBA) — and it’s often hard to know where to start.

Read More
news image

Security and Privacy White Paper

whitePaper | October 31, 2022

As cloud-based software solutions become prominent, discussions continue to revolve around security. When organizations implement a cloud-based solution, they put their trust in the solution provider to protect their data and deliver a secure platform.

Read More
news image

IoT Application Provisioning for Security Using FDO and TPM

whitePaper | December 29, 2022

The Internet of Things (IoT) offers the appealing possibility of harnessing millions of devices that measure or modify real world things and allows processes to be optimized. There are many opportunities: thermostats optimized for tomorrow’s weather, shipping containers optimized for packing before their contents arrive, assembly lines that reconfigure automatically for each item, street lighting adjusted to make streets safer, and so on.

Read More
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More
news image

Adobe Acrobat with Document Cloud Services Security Overview

whitePaper | October 26, 2022

At Adobe®, we know the security of your digital experiences is important. Security practices are deeply ingrained into our internal software development and operations processes and tools and are rigorously followed by our cross-functional teams to prevent, detect, and respond to incidents in an expedient manner.

Read More

Spotlight

First Base Technologies

Founded in 1989, First Base Technologies is a leading boutique cyber security testing, consulting and training services provider. Almost three decades in the security business, dealing with all manner of clients, gives us a unique perspective on the cyber security space. That perspective, coupled with continuous monitoring and analysis of emerging technologies and cyber threats, enables First Base to constantly innovate and adapt; creating new services and evolving existing services to ensure our increasing success in the 21st century cyber security landscape. First Base prides itself on being ethical, pragmatic and professional, delivering quality services on time and within budget. The independence of our advice is guaranteed, since we have no ongoing commercial involvement in product sales or installation.

Events