Security News

Can a 'Zero Trust' Approach Work in the Supply Chain?
2020-03-03 20:04

As a result, companies are not always sure who they are dealing with and the amount of opacity within the supply chain has increased, Conway says. These developments, Conway says, are one reason why the dialogue around supply chain security should be changing and why different approaches are needed.

5 considerations for building a zero trust IT environment
2020-03-02 05:30

Numerous vendors are building on these technical advancements to bring zero trust solutions to market. Adopting zero trust in IT: Five steps for building a zero trust environment.

Zero Trust: Definitions, Practicalities,  Challenges
2020-02-28 16:33

Zero trust is not a product or a destination, but rather a journey requiring organizations to practice good security hygiene, continuous monitoring and detection, as well as rapid incident response backed by high levels of automation, says Shehzad Merchant, chief technology officer of Gigamon. How the zero trust concept should be best defined and understood;.

Sizing Up the Roles of Behavioral Analytics, 'Zero Trust'
2020-02-26 18:18

Capps came to Mastercard in 2017 when the company acquired NuData Security, which provides behavioral biometrics tools to help prevent financial fraud. The agency urged enterprises to use more sophisticated techniques, such as biometrics or behavioral authentication, which includes using geolocation data or IP addresses, to help verify a users' identities.

BlackBerry launches new UES platform for zero trust
2020-02-26 04:15

BlackBerry announced at RSA Conference 2020 the BlackBerry Spark platform with a new unified endpoint security layer which can work with BlackBerry UEM and other unified endpoint management solutions to deliver BlackBerry's One Agent, One Console, One Crowd, One Cloud approach to achieve zero trust security. One Agent: Comprehensive endpoint support using a single agent, for desktop and mobile, IoT. One Console: Visibility across the enterprise to deliver security and Zero Trust with a zero touch end-user experience across endpoints, users, data, and networks managed through a single console.

Are CISOs ready for zero trust architectures?
2020-02-20 07:00

"Every request to access a resource starts from a position of zero trust. Access decisions are then made and enforced based on a set of trust metrics selected by the organization. These trust metrics could relate to the user, their access device, the resource to be accessed, or a combination thereof." What other business justification could CISOs spell out? One of the benefits is micro-segmentation, which is both a cause and a pre-requisite of zero trust architectures - depending on the organization's starting point.

The Goldilocks principle for zero trust fraud prevention
2020-02-06 06:00

Having recently received just such a bombardment at one of the larger IAM conferences, I was curious at how well zero trust applies to fraud prevention. Although the zero trust framework is gaining momentum in the enterprise, its basic concepts have been the mainstay of fraud prevention in industries like insurance, finance and retail for a very long time.

Why many security pros lack confidence in their implementation of Zero Trust
2020-02-04 19:15

Almost half of security professionals don't know where or how to use Zero Trust policies in a hybrid IT environment, says a survey commissioned by security provider Pulse Secure. The report found that confidence levels around the implementation of Zero Trust are about split down the middle.

Zero Trust: Beyond access controls
2020-01-23 06:30

One common misconception: Zero Trust is all about access controls and additional authentication, such as multi-factor authentication. While these two things help organizations get to a level of Zero Trust, there is more to it: a Zero Trust approach is really an organization-wide architecture.