Reading Time: 15 minutes12 Introduction In the first two posts of this Zero Trust series, we established that identity is the new perimeter and devices are the frontline of defence. By verifying every user and ensuring only healthy, compliant endpoints connect to your environment, you lay the foundation for a robust security posture. However, the story doesn’t end there. […]
Continue readingTag Archives: Zero Trust
Devices – The Second Pillar of Zero Trust
Reading Time: 20 minutes16 Introduction In the first post of this series, we explored how identity has become the new perimeter in a world where users, apps, and data are no longer confined to the corporate network. By putting identity at the centre of your security strategy and enforcing strong, phishing-resistant authentication and Conditional Access you lay the foundation […]
Continue readingIdentity: The New Perimeter in Zero Trust
Reading Time: 12 minutes9 Welcome to the first deep dive in my Zero Trust blog series. If you’ve read the series introduction, you’ll know that Zero Trust isn’t a single product or a quick fix it’s a strategic approach that touches every part of your digital environment. Over the coming posts, I’ll be breaking down each of the core […]
Continue readingZero Trust Blog Series: A Microsoft-Centric Approach
Reading Time: 14 minutes11 Introduction Over the past few years, I’ve seen a growing interest in Zero Trust but also a lot of confusion. Many still view it as a product you can buy or a feature you can switch on. In reality, Zero Trust is a mindset a strategic approach to security that requires continuous verification, least privilege access, […]
Continue reading


