<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>InfoQ - Cisco - Articles</title>
    <link>https://www.infoq.com</link>
    <description>InfoQ Cisco Articles feed</description>
    <item>
      <title>Article: Diving into Zero Trust Security</title>
      <link>https://www.infoq.com/articles/zero-trust-security/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Cisco-articles</link>
      <description>&lt;img src="https://res.infoq.com/articles/zero-trust-security/en/headerimage/generatedHeaderImage-1655816786121.jpg"/&gt;&lt;p&gt;The Zero Trust approach involves a combination of more-secure authentication approaches, such as MFA with profiling and posturing of the client device, along with some stronger encryption checks.  This article shares some insights on Zero Trust Security for your organization and your customers, and how you can get started with it.&lt;/p&gt; &lt;i&gt;By Sindhuja Rao, Deepank Dixit&lt;/i&gt;</description>
      <category>QCon Plus November 2021</category>
      <category>Authentication</category>
      <category>Cloud Security</category>
      <category>QCon Plus</category>
      <category>Security</category>
      <category>Cisco</category>
      <category>Authorization</category>
      <category>Access Control</category>
      <category>Culture &amp; Methods</category>
      <category>article</category>
      <pubDate>Thu, 23 Jun 2022 07:00:00 GMT</pubDate>
      <guid>https://www.infoq.com/articles/zero-trust-security/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Cisco-articles</guid>
      <dc:creator>Sindhuja Rao, Deepank Dixit</dc:creator>
      <dc:date>2022-06-23T07:00:00Z</dc:date>
      <dc:identifier>/articles/zero-trust-security/en</dc:identifier>
    </item>
  </channel>
</rss>
