Security News

CrowdStrike acquires Preempt to provide zero trust security architecture and threat protection
2020-09-24 23:00

CrowdStrike announced it has agreed to acquire Preempt Security, provider of zero trust and conditional access technology for real-time access control and threat prevention. Together, CrowdStrike and Preempt will provide a modern zero trust security architecture and threat protection to keep organizations' users, endpoints, and data safe from modern attacks, without compromising productivity or the user experience.

CrowdStrike Pushes Zero Trust With $96 Million Acquisition of Preempt Security
2020-09-24 02:15

CrowdStrike on Wednesday announced that it has agreed to acquire Preempt Security, a provider of Zero Trust and access control technology, in a deal valued at roughly $96 million. CrowdStrike plans integrate Preempt's technology into the CrowdStrike Falcon platform to help customers achieve end-to-end visibility and enforcement on identity data.

Top 5 things to know about zero trust ops
2020-09-15 14:28

Checking users, applications, and devices on your network are just a few ways to keep your company safe from cyberattacks. Tom Merritt lists five things to know about zero trust ops.

Top 5 things to know about zero trust ops
2020-09-15 14:25

Checking users, applications, and devices on your network are just a few ways to keep your company safe from cyberattacks. Tom Merritt lists five things to know about zero trust ops.

How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces
2020-09-07 14:11

Fully aligned with SASE's edge-based security approach, the Zero Trust security construct can be executed using the SASE framework. To understand how SASE is an approach that enables a Zero Trust security model, we'll dig a little deeper into Gartner's vision.

University CISOs say zero trust is the best defense against the existential threat of phishing
2020-08-20 18:40

CISOs at Stanford University, the University of Chicago Medicine, and The Ohio State University list phishing as the top security threat to students, professors, and researchers. The group also agreed zero trust is the best security approach but a hard sell in an academic setting.

In reality, how important is zero trust?
2020-08-14 04:00

Although most IT and security professionals think of zero trust as an important part of their cybersecurity approach, many still have a long way to go on their quest to deploying it, according to Illumio. Especially as users continue to move off campus networks to a distributed work-from-home model and face new and expanding threat vectors, organizations must quickly adopt the zero trust security mindset of "Never trust, always verify" to mitigate the spread of breaches by limiting access and preventing lateral movement.

Zero trust is critical, but very underused
2020-08-13 19:05

Organizations must quickly adopt the zero trust mindset of "Never trust, always verify" to mitigate the spread of breaches, limit access, and prevent lateral movement, according to an Illumio report. Today, a new report from microsegmentation platform Illumio, revealed how organizations approach and incorporate zero trust into business and cybersecurity strategies, as everyone moves deeper into the second half of the new business normal, under COVID-19 restrictions.

Pulse Zero Trust Access simplifies management and mitigates cyber risks
2020-07-29 01:00

Pulse Secure announced the launch of Pulse Zero Trust Access, a cloud-based, multi-tenant secure access service that enables organizations to provide users easy, anywhere access to multi-cloud and data center applications with Zero Trust assurance. Pulse Zero Trust Access offers users streamlined application access while allowing organizations to govern every request by automatically verifying identity, device and security posture before granting a direct, encrypted connection between that user's device and applications residing in public clouds, private clouds or data centers.

Tune in this week to learn all about an identity-centric approach to zero-trust security
2020-07-27 22:56

The adoption of mobile and cloud, and the coronavirus pandemic forcing people to work from home, shows you can no longer rely on computer security based on a simple network perimeter. There is no silver bullet in achieving a zero-trust architecture.