How much should you trust your endpoints? Zero!

clock • 2 min read

Should a Zero trust approach be used when it comes to end point security given the rise of hybrid working? If so, which solutions are the most recent and effective? How important is education around endpoint tech security for the workforce? Will North, Chief Security Officer at MHR shares his insight

Zero trust is no longer just a buzz word, but a must when it comes to effectively securing endpoints within a hybrid working environment.  The days when security was centralised at the office, a...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
SSO is dead: Why the age of zero trust demands secure explicit sign-on

Security Technology

Single sign-on's cons now outweigh the pros

clock 03 September 2024 • 5 min read
SonicWall snaps up zero-trust firm Banyan

Mergers and Acquisitions

Second acquisition for SonicWall in two months

clock 03 January 2024 • 1 min read
'You have to encrypt everything': Public sector security in the zero-trust age

Public Sector

Years of high-profile breaches have spurred movement – at least overseas

clock 18 December 2023 • 3 min read
Most read
01
02

IT Essentials: Regulators hate this one simple trick

02 September 2024 • 3 min read
04

Brazil bans X

02 September 2024 • 3 min read
05

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Microsoft offers advice on avoiding another CrowdStrike-style outage

Microsoft offers advice on avoiding another CrowdStrike-style outage

Vendors should minimise use of kernel mode, customers should make full use of integrated Windows security features

John Leonard
clock 29 July 2024 • 3 min read
'Gay furry hackers' breach conservative US think tank behind Project 2025

'Gay furry hackers' breach conservative US think tank behind Project 2025

Heritage Foundation calls group "degenerate perverts"

Tom Allen
clock 11 July 2024 • 2 min read
Why 'change' for the UK must include cybersecurity

Why 'change' for the UK must include cybersecurity

Labour needs to to get ahead and demonstrate a commitment to security from the outset

Rick Jones
clock 11 July 2024 • 4 min read