<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1838014323211965&amp;ev=PageView&amp;noscript=1">
Author

Matt Chiodi

Founding Technical Advisor and Chief Trust Officer

Cerby blog
| Nov 18, 2024
Disconnected apps challenge a Zero trust (ZT) strategy, mainly because they fall outside centralized identity management systems like Okta and Entra ID. In the first blog of this two part series, we explored the security risks that disconnected...
Cerby blog
| Oct 21, 2024
Zero trust (ZT) works when deployed consistently, but you can’t apply it to apps that are disconnected from your identity infrastructure. When we think of enterprise apps, we often focus on major SaaS apps like M365 and SalesForce. However, countless...
Zero Trust, cybersecurity
Cerby blog
| May 21, 2024
Tackling the Last Mile Problem in Zero Trust In cybersecurity, the last mile problem continues to challenge organizations striving to implement a comprehensive zero trust strategy. Nonstandard and disconnected applications often fall outside the scope of...
Industry insights, Zero Trust
Cerby blog
| Dec 8, 2023
In cybersecurity, the Healthcare and Public Health (HPH) sector faces an ever-evolving array of threats. The notorious Clop ransomware group has recently made headlines, targeting organizations with sophisticated attacks. These incidents underscore the...
Company
Cerby blog
| Apr 24, 2023
Unearthing the truth behind nonfederated applications through independent research.
Industry insights
Cerby blog
| Apr 14, 2023
Zero Trust is a journey and is not something you can buy from a vendor.
Industry insights
Cerby blog
| Feb 22, 2023
An enforcement-based approach to security
Security
Cerby blog
| Jan 11, 2023
Cerby's research shows that employee application choice is intimately tied to how people get their work done and their job satisfaction levels.
Company
Cerby blog
| Nov 10, 2022
Social media impact on the U.S. politics
Industry insights
Cerby blog
| Aug 3, 2022
What are unmanageable applications? Unmanageable applications are a class of applications defined by their lack of support for common identity and security standards. While Shadow IT can refer to any application used without IT and security approval,...
Security