Skip to main content
SecurID Blog

The Language of Cybersecurity

zero trust architecture

What is zero trust?

First coined by Forrester in 2010, the term ‘zero trust’ refers to a new approach to security that relies on continuously verifying the trustworthiness of every device, user and application in an enterprise. Prior to this notion of zero trust, most security teams relied on a “trust but verify” approach that emphasized a strong defensive […]

Read more

What is multi-factor authentication (MFA) and how does it work?

As the name suggests, multi-factor authentication (MFA) is the use of multiple factors to confirm the identity of someone who is requesting access to an application, website or other resource. Multi-factor authentication is the difference between, for example, entering a password to gain access and entering a password plus a one-time password (OTP), or a […]

Read more
93% of companies are “moderately” to “extremely” concerned about cloud security

What is cloud security?

Cloud security is the practice of protecting cloud-based data, applications and infrastructure from unauthorized access, cyberattacks and other threats.

Read more