zero trust
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102734/bulb-400x200.jpg)
Rethinking cybersecurity becomes imperative as devices and apps move away from physical offices
69.1% of professionals with security responsibility believe a rethink is needed to deal with the threat of cybersecurity now that devices and applications have moved outside …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095247/zero-400x200.jpg)
Zero trust isn’t just for IT, it can also protect targeted critical infrastructure
Gartner predicts that by 2025 cyber attackers will have weaponized OT environments to successfully harm or kill humans. Not only is a solution to secure OT assets imperative, …
![immudb](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/14193402/immudb-1200-hns-400x200.jpg)
Immudb: Open-source database, built on a zero trust model
Now, with full transactional support for everyday business applications, the open source immudb tamper-proof database can serve as the main transactional database for …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
When done right, network segmentation brings rewards
96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101202/business-400x200.jpeg)
Top practices to improve enterprise security
Cisco released its latest cybersecurity report, surveying more than 5,100 security and privacy professionals across 27 markets to determine the most impactful measures teams …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
The current state of zero trust: Awareness is high, adoption is lagging
One Identity released global survey findings that unpack the current state of zero trust awareness and adoption across the enterprise. As zero trust awareness continues to …
![IoT connection](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104554/iot-connection-400x200.jpg)
Your supply chain: How and why network security and infrastructure matter
With digital transformation, the rapid adoption of cloud computing and the IoT, and the global scale of today’s supply chains, cybercriminals have more entry points to …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095247/zero-400x200.jpg)
Companies ditching VPNs for zero trust architectures to secure hybrid workplaces
Hybrid workplaces are the new norm, with 99% of respondents’ reporting their workforces will split time between the office and remote settings post-pandemic, a Teradici survey …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135226/zero-number-1-400x200.jpg)
Operational technology and zero trust
Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/19122705/lock-silver-400x200.jpg)
Security standards should be strengthened outside the federal government too
Tripwire announced the results of a research report that evaluated actions taken by the federal government to improve cybersecurity in 2021. Conducted by Dimensional Research, …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135226/zero-number-1-400x200.jpg)
The role of visibility and analytics in zero trust architectures
Zero trust architecture (ZTA) is not a new concept, but with the White House Executive Order published earlier this year, many in the networking space have started to ask …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092834/industrial-400x200.jpg)
Unseen gatekeepers: Industrial software providers’ role securing global infrastructure
National infrastructure in almost every Western country has come under attack by threat actors in the last few years. These attacks have grabbed the attention of businesses, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege