Security News

Reduce your network’s attack surface with Zero Trust Network Access
2022-02-08 00:00

Perimeter 81's cloud-delivered, user-friendly platform offers a seamless SaaS interface with a feature-rich experience including built-in SSO and 2FA integrations. Perimeter 81's self-service portal allows organizations to create, deploy and scale their secure network infrastructure and business applications quickly and without friction.

Behind The Buzzword: Four Ways to Assess Your Zero Trust Security Posture
2022-02-02 09:42

Some vendors have even begun to claim these measures as a form of Zero Trust, a popular idea where organizations should not trust any entity and provide access to its applications and data until its risk levels are verified. While most of us understand Zero Trust conceptually, the path to Zero Trust is a complex and constantly evolving journey.

What are real organisations doing with zero trust?
2022-02-02 07:26

Like many concepts in cyber-security, Zero Trust has come to prominence recently. The concept is reckoned to have first been used in the mid-1990s, though it came to prominence around 2010 and has really started to take off in the past three years or so.

How ready are federal agencies for zero trust implementation?
2022-02-01 06:00

More than 70 percent of federal agencies are aggressively adopting zero trust principles, while another 26 percent are adopting where they feel it makes sense, according to a Merlin Cyber and MeriTalk report. The report is based on a survey of more than 150 federal cybersecurity decision makers and explores the priorities, goals and anticipated challenges around the federal government's zero trust implementations.

How would zero trust prevent a Log4Shell attack?
2022-01-27 06:30

The consequence of a Log4Shell attack is that the exploited server tries to download code from an internet site owned by the attacker. Even if a Log4Shell vulnerability is exploited in the server, it cannot download and later run any malicious code, as the outgoing traffic from the DMZ to the internet would have been prohibited.

White House wants US govt to use a Zero Trust security model
2022-01-26 16:00

A newly released Federal strategy wants the US government to adopt a "Zero trust" security model within the next two years to defend against current threats and boost cybersecurity defenses across federal agencies. The executive order initiated a government-wide effort to migrate toward zero trust and modernize the nation's defenses against cyberattacks.

Zero-trust security market to reach $64.4B by 2027
2022-01-18 04:00

Amid the COVID-19 crisis, the global market for zero-trust security estimated at $18.3 billion in the year 2020, is projected to reach a revised size of $64.4 billion by 2027, growing at a CAGR of 19.7% over the period 2020-2027, according to ResearchAndMarkets. On-Premise, one of the segments analyzed in the report, is projected to record 19% CAGR and reach US$39.

Why is intergenerational collaboration critical in advancing zero trust security progress?
2022-01-17 05:00

Baby Boomers play a critical role in accelerating zero trust security frameworks due to experience in integrating legacy technologies into cloud and hybrid IT environments, an Appgate study reveals. The study, based on desk research and in-depth focus groups conducted by prominent intergenerational issues author and speaker Henry Rose Lee, examines differences between Baby Boomers, Gen-Xers and Millennials and ways to harness individual strengths to develop more effective cybersecurity strategies.

Here’s REALLY How to Do Zero-Trust Security
2022-01-11 22:13

It's not about buying security products! Joseph Carson, chief security scientist from ThycoticCentrify, offers practical steps to start the zero-trust journey. What exactly is zero-trust? Where did it come from? And most importantly, how can it be effectively implemented to enhance the security posture of an organization?

Supply chains, ransomware, zero trust and other security predictions for 2022
2021-12-31 05:00

As 2021 draws to a close, no one in their right mind thinks that cybersecurity risk is just someone else's problem anymore; major cybersecurity incidents like the SolarWinds breach and the Colonial Pipeline ransomware attack have raised cybersecurity awareness among public opinions and decision-makers. Supply chain attackers can take various paths to slip malicious code or components into a trusted piece of software or hardware.