Security News

Industrial sectors embrace zero trust for enhanced security
2024-04-08 03:30

Organizations are leveraging zero trust to enhance the safety, security, and reliability of their enterprise across IT and OT environments, according to Xage Security. Zero trust security implementation in industrial sectors.

Implementing Zero Trust Controls for Compliance
2024-03-22 11:28

The ThreatLocker® Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability to set policy-based controls...

NSA shares zero-trust guidance to limit adversaries on the network
2024-03-05 23:29

The National Security Agency is sharing new guidance to help organizations limit an adversary's movement on the internal network by adopting zero-trust framework principles.The NSA released today zero-trust guidance for the network and environment component, which comprises all hardware and software assets, non-person entities, and inter-communication protocols.

The double-edged sword of zero trust
2024-02-19 04:00

Unlike conventional systems that often rely on perimeter defenses, zero trust adopts a more discerning philosophy, treating every user, device, and transaction as untrusted by default. In this Help Net Security round-up, we present segments from previously recorded videos in which cybersecurity experts emphasize the importance of zero trust in the context of cybersecurity, underscoring its crucial role in mitigating the risks posed by cyber threats and evolving attack vectors.

How to Apply Zero Trust to your Active Directory
2024-02-07 15:05

It's vital the credentials stored within are kept secure - so how can we apply zero trust principles towards keeping our Active Directory secure? Password reset processes are often a point of vulnerability in an organization's Active Directory security, especially when they involve sending a reset link or code to the user's email or phone.

Zero trust implementation: Plan, then execute, one step at a time
2024-02-01 06:00

You've probably heard it before: zero trust is not a single product, but a security strategy that follows the principle of "Never trust, always verify". Implementing zero trust means an overall change in technology and architecture, and doing it one step at the time.

Understanding zero-trust design philosophy and principles
2024-01-09 05:30

In this Help Net Security interview, Phil Vachon, Head of Infrastructure in the Office of the CTO at Bloomberg, discusses the varying definitions of zero trust among security professionals and companies, emphasizing its broad design philosophy. Why does the definition of zero trust vary so significantly among security professionals and companies? How do these variations impact companies' approach toward implementing zero trust?

Webinar – Leverage Zero Trust Security to Minimize Your Attack Surface
2024-01-08 09:01

Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit the vulnerabilities stemming from software and...

Benefits of Adopting Zero-Trust Security
2023-12-14 16:00

In this TechRepublic Premium guide, we will explore the benefits of incorporating zero-trust security into your organization's cybersecurity framework to prevent data breaches and strengthen the protection of your IT infrastructure. Zero trust provides granular control over who can access what in the cloud and container setups.

Why zero-trust segmentation is critical for cloud resilience
2023-12-06 04:30

Nearly all organizations rely on the cloud to store sensitive data and run critical systems. 93% agree that zero-trust segmentation is essential to their cloud security strategy.