Stratascale
Stratascale
Alex Banghart

Alex Banghart

Cybersecurity Research Analyst

Alex is a cyber security research analyst at Stratascale. His background in both research and practical security gives him a unique perspective on providing security with a risk-based approach. He focuses his expertise on emerging technologies, data-driven IT strategy, and tactical solutions to large security problems.

By Alex Banghart

Technical Manager's Guide to Zero Trust - Data

Technical Manager's Guide to Zero Trust - Data

May 9, 2023

ZT Data managers must protect the crown jewels of the organization while dealing with ever expanding data needs.

Technical Manager’s Guide- Devices Insights

Technical Manager’s Guide- Devices Insights

May 2, 2023

ZT device managers need to balance ease of access with security while juggling the ever-changing and expanding list of devices.

DevSecOps Disruptors and Innovators

DevSecOps Disruptors and Innovators

Apr 27, 2023

DevSecOps can help reduce the cost to remediation and deliver safer software faster.

Future of Cyberinsurance

Future of Cyberinsurance

Mar 23, 2023

As Cyber Insurance is getting harder to obtain and premiums keep increasing it is more important than ever to understand the market.

The Metaverse: Securing the Future

The Metaverse: Securing the Future

Mar 16, 2023

As the metaverse expands, so do the security risks associated with it.

Technical Manager’s Guide to Zero Trust: Identity

Technical Manager’s Guide to Zero Trust: Identity

Mar 9, 2023

ZT identity managers face significant challenges as they balance access requirements with security mandates.

Technical Manager’s Guide to Zero Trust: Applications

Technical Manager’s Guide to Zero Trust: Applications

Dec 15, 2022

ZT applications managers face significant challenges as they balance top-down executive mandates with the need to make progress on software issues.

Zero Trust Vendors to Watch, Know, Understand: ZT Applications

Zero Trust Vendors to Watch, Know, Understand: ZT Applications

Dec 13, 2022

CISOs expect application security to fully support ZT, while AppSec managers use the ZT framework to organize & prioritize investments and activities.

Technical Manager’s Guide to Zero Trust: Infrastructure

Technical Manager’s Guide to Zero Trust: Infrastructure

Dec 1, 2022

By identifying key priorities before a breach, ZT infrastructure managers can contribute meaningfully to the success of the organization’s ZT strategy.

Zero Trust Vendors to Watch, Know, Understand: ZT Infrastructure

Zero Trust Vendors to Watch, Know, Understand: ZT Infrastructure

Nov 29, 2022

Contemporary zero trust infrastructure often centers on outside-the-perimeter resources, challenging security leaders who are looking to establish resilient environments.

Technical Manager’s Guide to Zero Trust: Network

Technical Manager’s Guide to Zero Trust: Network

Oct 25, 2022

Zero trust networks provide visibility into key issues, including segmentation, secure access to data, applications, and identity and device resources.

Zero Trust Vendors to Watch, Know, Understand: ZT Network

Zero Trust Vendors to Watch, Know, Understand: ZT Network

Oct 18, 2022

The network plays a unique role in the shift from traditional perimeter-based security strategies to zero trust, spanning four key categories.

Zero Trust Metrics

Zero Trust Metrics

Sep 16, 2022

Identifying and employing relevant, meaningful metrics builds support for ZT across the organization and enables CISOs to avoid “precision without accuracy”

The Path to Zero Trust

The Path to Zero Trust

Aug 30, 2022

This article defines a 10-step path to zero trust (ZT), spanning foundational and transitional activities and “deploy, monitor, and evolve” action steps.

The Zero Trust Rollout Notebook

The Zero Trust Rollout Notebook

Aug 23, 2022

This article identifies six key factors that contribute to a CISO’s ability to work with corporate stakeholders to roll out zero trust (ZT).