zero trust
7 steps to switch your organization to a zero trust architecture
In recent years, zero trust security has gained incredible attention from the government, cybersecurity leaders and regulators. Many organisations are still fuzzy on what zero …
Simplifying legal entity identification in the digital age
As the world’s legal entities rush to digitize their processes and transactions, confidence in digital authenticity is in short supply. Thankfully, a single, open and …
Despite known security issues, VPN usage continues to thrive
VPN usage is still prevalent among 90% of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption, according to a new …
Zero trust adoption: Industry-specific challenges and implementation strategies
Organizations across many industries are in the throes of a journey to implement the zero trust security model to increase their cybersecurity posture. Through my experience …
Zero trust segmentation eliminates 5 cyber disasters per year and saves $20+ million annually
Illumio released The Zero Trust Impact Report, a research on market perspectives of zero trust strategies and the business impact of segmentation technology. Conducted by The …
Zero-trust-washing: Why zero trust architecture is the framework to follow
Have we got to the point where the term “zero trust” is being misused or misrepresented by some vendors as they look to capitalize on its momentum in the market? It is a …
By streamlining compliance, companies can focus more on security
A-LIGN released its 2022 Compliance Benchmark Report, highlighting the concern over increased threat of ransomware attacks and the need for organizations to adopt a more …
Where do federal agencies stand with zero trust implementation?
One year after the president’s executive order on improving the nation’s cybersecurity, federal agencies are making steady progress toward their zero trust security goals, …
How to implement a best-in-class SASE architecture
To support cloud-enabled digital transformation strategies, a tighter integration of security and SD-WAN architectures are top of mind for many CIOs and CISOs. That also …
Post-pandemic priorities for security leaders
Info-Tech Research Group has published its annual report on the priorities for security leaders. The report combines insights from the 2022 security priorities survey and …
The hierarchy of cybersecurity needs: Why EASM is essential to any zero-trust architecture
Zero trust was born out of the critical need to modernize outdated IT architecture, which assumes that all assets within an organization – and attached to it – should be …
4 steps for building an orchestrated authorization policy for zero trust
There is a great deal of emphasis placed on the zero-trust approach with respect to access. Looking beyond authentication (the act of verifying that someone is who they say …
Featured news
Sponsored
Don't miss
- AI cybersecurity needs to be as multi-layered as the system it’s protecting
- OpenZiti: Secure, open-source networking for your applications
- Best practices for implementing the Principle of Least Privilege
- Phishing in focus: Disinformation, election and identity fraud
- Exposed: Russian military Unit 29155 does digital sabotage, espionage