Security News

Zero trust is critical, but very underused
2020-08-13 19:05

Organizations must quickly adopt the zero trust mindset of "Never trust, always verify" to mitigate the spread of breaches, limit access, and prevent lateral movement, according to an Illumio report. Today, a new report from microsegmentation platform Illumio, revealed how organizations approach and incorporate zero trust into business and cybersecurity strategies, as everyone moves deeper into the second half of the new business normal, under COVID-19 restrictions.

Pulse Zero Trust Access simplifies management and mitigates cyber risks
2020-07-29 01:00

Pulse Secure announced the launch of Pulse Zero Trust Access, a cloud-based, multi-tenant secure access service that enables organizations to provide users easy, anywhere access to multi-cloud and data center applications with Zero Trust assurance. Pulse Zero Trust Access offers users streamlined application access while allowing organizations to govern every request by automatically verifying identity, device and security posture before granting a direct, encrypted connection between that user's device and applications residing in public clouds, private clouds or data centers.

Tune in this week to learn all about an identity-centric approach to zero-trust security
2020-07-27 22:56

The adoption of mobile and cloud, and the coronavirus pandemic forcing people to work from home, shows you can no longer rely on computer security based on a simple network perimeter. There is no silver bullet in achieving a zero-trust architecture.

Cyral ships zero trust data layer GA security platform
2020-07-07 02:00

Cyral, provider of the first cloud security platform for the data layer, announced general availability of its data layer security platform. "Cyral pioneered the concept of a security platform for the data layer and has closed scores of new customer trials and production deployments since announcing our funding in January 2020," said Manav Mital, founder and CEO of Cyral.

BehavioSec meets enhanced authentication demands by delivering zero trust safeguards
2020-07-02 01:30

BehavioSec is positioned for strong growth as post-pandemic mobile shifts and evolving cyber threats highlight greater demand for deep authentication and anti-fraud capabilities delivering increased trust without breaking the user experience. BehavioSec's intuitive behavioral biometrics technology meets enhanced authentication demands by delivering zero trust safeguards authenticating individuals based on users' typing patterns, touchscreen activity and cursor movements, beyond vulnerable passwords.

Trustgrid’s Zero Trust platform extends software-defined perimeter to roaming end users
2020-06-05 01:00

Trustgrid announced an extension of their leading Zero Trust software-defined perimeter platform to include agents for roaming end points. The newly released Mac and PC agents address the growing demand for secure connectivity between remote end users and enterprise applications that require access from personal devices in home offices.

Lean into zero trust to ensure security in times of agility
2020-06-02 05:20

Zero trust aims to eliminate implicit trust associated with the locality of user access, for example users on the Intranet versus the Internet, and moves the focus of security to applications, devices, and users. Zero trust is a framework, an approach to managing IT and network operations that helps drive protection and prevent security breaches.

Zero trust security: A cheat sheet
2020-05-29 18:21

The US National Institute of Standards and Technology, in its current draft of standards for zero trust architecture, defines zero trust basically as "Zero trust is a cybersecurity paradigm focused on resource protection and the premise that trust is never granted implicitly but must be continually evaluated." NIST adds, there is a distinction to be drawn between zero trust and zero trust architecture.

Why is SDP the most effective architecture for zero trust strategy adoption?
2020-05-29 04:30

Software Defined Perimeter is the most effective architecture for adopting a zero trust strategy, an approach that is being heralded as the breakthrough technology for preventing large-scale breaches, according to the Cloud Security Alliance. "Most of the existing zero trust security measures are applied as authentication and sometimes authorization, based on policy after the termination of Transport Layer Security certificates," said Nya Alison Murray, senior ICT architect and co-lead author of the report.

Why zero trust security needs strong hardware foundations
2020-05-28 06:00

The Intel vPro® platform is a set of capabilities embedded into the hardware of endpoint systems aimed at businesses and large organisations, covering areas such as security and remote management. The latest updates to the Intel vPro® platform includes a new security technology called Intel® Hardware Shield.