zero trust

The future of security protocols for remote work
Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing businesses to start putting a …

The public sector is more concerned about external than internal threats
SolarWinds announced the findings of its Public Sector Cybersecurity Survey Report. This survey includes responses from 400 IT operations and security decision makers, …

Supply chains, ransomware, zero trust and other security predictions for 2022
As 2021 draws to a close, no one in their right mind thinks that cybersecurity risk is just someone else’s problem anymore; major cybersecurity incidents like the SolarWinds …

Rethinking cybersecurity becomes imperative as devices and apps move away from physical offices
69.1% of professionals with security responsibility believe a rethink is needed to deal with the threat of cybersecurity now that devices and applications have moved outside …

Zero trust isn’t just for IT, it can also protect targeted critical infrastructure
Gartner predicts that by 2025 cyber attackers will have weaponized OT environments to successfully harm or kill humans. Not only is a solution to secure OT assets imperative, …

Immudb: Open-source database, built on a zero trust model
Now, with full transactional support for everyday business applications, the open source immudb tamper-proof database can serve as the main transactional database for …

When done right, network segmentation brings rewards
96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, …

Top practices to improve enterprise security
Cisco released its latest cybersecurity report, surveying more than 5,100 security and privacy professionals across 27 markets to determine the most impactful measures teams …

The current state of zero trust: Awareness is high, adoption is lagging
One Identity released global survey findings that unpack the current state of zero trust awareness and adoption across the enterprise. As zero trust awareness continues to …

Your supply chain: How and why network security and infrastructure matter
With digital transformation, the rapid adoption of cloud computing and the IoT, and the global scale of today’s supply chains, cybercriminals have more entry points to …

Companies ditching VPNs for zero trust architectures to secure hybrid workplaces
Hybrid workplaces are the new norm, with 99% of respondents’ reporting their workforces will split time between the office and remote settings post-pandemic, a Teradici survey …

Operational technology and zero trust
Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains