<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>InfoQ - Access Control - Articles</title>
    <link>https://www.infoq.com</link>
    <description>InfoQ Access Control Articles feed</description>
    <item>
      <title>Article: Diving into Zero Trust Security</title>
      <link>https://www.infoq.com/articles/zero-trust-security/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Access+Control-articles</link>
      <description>&lt;img src="https://res.infoq.com/articles/zero-trust-security/en/headerimage/generatedHeaderImage-1655816786121.jpg"/&gt;&lt;p&gt;The Zero Trust approach involves a combination of more-secure authentication approaches, such as MFA with profiling and posturing of the client device, along with some stronger encryption checks.  This article shares some insights on Zero Trust Security for your organization and your customers, and how you can get started with it.&lt;/p&gt; &lt;i&gt;By Sindhuja Rao, Deepank Dixit&lt;/i&gt;</description>
      <category>Cisco</category>
      <category>Authorization</category>
      <category>QCon Plus</category>
      <category>Access Control</category>
      <category>Security</category>
      <category>QCon Plus November 2021</category>
      <category>Cloud Security</category>
      <category>Authentication</category>
      <category>Culture &amp; Methods</category>
      <category>article</category>
      <pubDate>Thu, 23 Jun 2022 07:00:00 GMT</pubDate>
      <guid>https://www.infoq.com/articles/zero-trust-security/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Access+Control-articles</guid>
      <dc:creator>Sindhuja Rao, Deepank Dixit</dc:creator>
      <dc:date>2022-06-23T07:00:00Z</dc:date>
      <dc:identifier>/articles/zero-trust-security/en</dc:identifier>
    </item>
  </channel>
</rss>
