Reading Time: 20 minutes16 Introduction In the first post of this series, we explored how identity has become the new perimeter in a world where users, apps, and data are no longer confined to the corporate network. By putting identity at the centre of your security strategy and enforcing strong, phishing-resistant authentication and Conditional Access you lay the foundation […]
Continue readingTag Archives: Zero Trust
Identity: The New Perimeter in Zero Trust
Reading Time: 12 minutes9 Welcome to the first deep dive in my Zero Trust blog series. If you’ve read the series introduction, you’ll know that Zero Trust isn’t a single product or a quick fix it’s a strategic approach that touches every part of your digital environment. Over the coming posts, I’ll be breaking down each of the core […]
Continue readingZero Trust Blog Series: A Microsoft-Centric Approach
Reading Time: 14 minutes11 Introduction Over the past few years, I’ve seen a growing interest in Zero Trust but also a lot of confusion. Many still view it as a product you can buy or a feature you can switch on. In reality, Zero Trust is a mindset a strategic approach to security that requires continuous verification, least privilege access, […]
Continue reading

