A continuous process of identifying, assessing, prioritizing and mitigating weaknesses in IT systems to prevent cyber attacks.
Identity and Access Management (IAM)
An introduction to identity and access management (IAM), its importance, how it works, NIST CSF IAM control categories, and resources for further reading.
Zero Trust
Zero Trust, its guiding principles, and how it can be implemented through a Zero Trust Architecture. It also lists various technologies that can assist in deploying Zero Trust and discusses the Zero Trust Maturity Model.