Security News

Analyzing and implementing a national zero trust architecture
2021-10-18 06:00

These basic practices are just a small part of the larger zero trust security model, which is based on the concept such of "Never trust, always verify," multi-factor authentication, least privileged access, and micro-segmentation. The zero trust security model has been around for over a decade, but did not reach widespread adoption until recently.

Mandating a Zero-Trust Approach for Software Supply Chains
2021-10-13 13:22

CISO at JupiterOne, discusses software bills of materials and the need for a shift in thinking about securing software supply chains. In the wake of the SolarWinds attack last year, President Biden issued an executive order in May advocating for mandatory software bills of materials, or SBOMs, to increase software transparency and counter supply-chain attacks.

4 Key Questions for Zero-Trust Success
2021-10-07 17:42

As companies seek to implement a zero-trust network access solution, there are important considerations that need to be made to avoid common pitfalls, in areas such as performance, data loss protection, advanced threat protection, visibility and reporting. Performance is crucial when it comes to selecting the right ZTNA solution.

The Gap in Your Zero Trust Implementation
2021-09-21 21:18

A zero trust security model is based on the idea that no IT resource should be trusted implicitly. Prior to the introduction of zero trust security, a user who authenticated into a network was trustworthy for the duration of their session, as was the user's device.

Zero trust security solutions widely adopted, spurred by surge in ransomware
2021-09-20 04:30

Over a decade after the zero trust security concept was first introduced, Ericom's survey results indicate that zero trust solutions are being widely adopted. Spurred by the recent sharp increase in ransomware and other sophisticated cyberattacks, the majority of organizations - 80% - have concrete plans to enable zero trust security solutions within the next year, with over half planning to begin implementation during 2021.

Zero Trust Requires Cloud Data Security with Integrated Continuous Endpoint Risk Assessment
2021-09-14 03:26

Zero Trust deployment - moving all your apps and data to the cloud and assuming no user or device is trustworthy until proven otherwise in order to gain access - has been rapidly introduced as a result of the pandemic. Most attempts at achieving Zero Trust access today are a patchwork of disparate products from different vendors connected to virtual private networks, with rudimentary on-off access controls based on limited visibility.

A zero-trust future: Why cybersecurity should be prioritized for the hybrid working world
2021-09-10 05:00

Last year's sudden transition has created numerous cybersecurity challenges for businesses as they attempt to adjust to this new way of working. Some of the new security challenges - both for employees and employers - include BYOD policies, sharing the same network with relatives or roommates, using the same devices for work and personal activities, VPN security issues and, of course, working from home with more distractions in our personal lives.

Week in review: The state of maritime cybersecurity, zero trust architecture challenges
2021-09-05 08:00

Vulnerabilities allow attackers to remotely deactivate home security systemA DiY home security system sold to families and businesses across the US sports two vulnerabilities that, while not critical, "Are trivially easy to exploit by motivated attackers who already have some knowledge of the target," Rapid7 warns. Cyber threats, passenger vessels and superyachts: The current state of playIn this interview with Help Net Security, Peter Broadhurst, Maritime Senior VP Safety, Security, Yachting and Passenger, Inmarsat, talks about the impact of cyber threats on passenger vessels and superyachts, and provides an inside look at maritime cybersecurity today.

Using zero trust to mitigate 5G security challenges
2021-09-01 06:30

In this interview with Help Net Security, Chris Christou, Vice President at Booz Allen Hamilton, talks about evolving 5G security issues, leveraging zero trust, as well as implementing 5G security. How can organizations leverage zero trust to enable a better response to new security challenges as 5G rolls out?

Challenges organizations face when implementing zero trust architecture
2021-08-27 04:00

98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to Illumio. The report also revealed the challenges organizations face when implementing zero trust architecture.