Yogesh GuptaPart 3 — Zero Trust StrategyThis is the concluding part of my Zero Trust case, which I started with an argument that Zero Trust is not a solution. And I continue to…Sep 11, 2022Sep 11, 2022
Yogesh GuptaPart 2 — The need of Zero-Trust SecurityIn my previous blog — Part 1 : Zero-trust is not a “solution”, I have argued that zero trust is not a single security solution but then…Aug 20, 20222Aug 20, 20222
Yogesh GuptaPart 1 : Zero-trust is not a “solution”Every security vendor that I have met and who has given a presentation to me in last six months starts with either a zero-trust “solution”…Aug 13, 20221Aug 13, 20221
Yogesh GuptaTen Steps for effective cloud security programAs organizations move their workloads to cloud and business is looking at cloud as cost-effective solution for their IT Infrastructure, It…Jul 31, 2022Jul 31, 2022
Yogesh Gupta10 Steps to Cloud Security: Step 10 — Understand the security requirements of the exit process(Originally published by author in May. 2018 in Peerlyst.com)Jul 31, 2022Jul 31, 2022
Yogesh Gupta10 Steps to Cloud Security: Step 9 — Manage security terms in the cloud service agreement(Originally published by author in May. 2018 in Peerlyst.com)Jul 31, 2022Jul 31, 2022
Yogesh Gupta10 Steps to Cloud Security: Step 8 — Evaluate security controls on physical infrastructure(Originally published by author in May. 2018 in Peerlyst.com)Jul 31, 2022Jul 31, 2022
Yogesh Gupta10 Steps to Cloud Security: Step 7- Ensure cloud networks and connections are secure(Originally published by author in May. 2018 in Peerlyst.com)Jul 31, 2022Jul 31, 2022
Yogesh Gupta10 Steps to Cloud Security: Step 6 — Assess the security provisions for cloud applications(Originally published by author in Apr. 2018 in Peerlyst.com)Jul 31, 2022Jul 31, 2022
Yogesh Gupta10 Steps to Cloud Security: Step 5 — Enforce policies for protection of personal data(Originally published by author in Jan. 2018 in Peerlyst.com)Jul 31, 2022Jul 31, 2022