Security News

A Practical Guide to Zero-Trust Security
2020-01-15 21:17

Perhaps the most notable of the emerging security models is zero trust. "Zero trust" is a phrase first coined by John Kindervag of Forrester in 2010 to describe the need to move security leaders away from a failed perimeter-centric approach and guide them to a model that relies on continuous verification of trust across every device, user and application.

2020: The Year of Zero Trust?
2019-12-31 08:18

"Zero Trust" security is rapidly transitioning from a marketing buzzword to a practical methodology for protecting today's global networks. Stan Lowe, global CISO of Zscaler, shares his 2020...

Ping Identity supports enterprise customers in developing their Zero Trust security strategy
2019-12-19 03:30

Ping Identity, a pioneer in Intelligent Identity solutions, announced its continued support for enterprises in developing a Zero Trust security infrastructure with new capabilities, practical...

Managing Identity in a 'Zero Trust' Environment
2019-12-12 15:04

Nexus' Tejas Lagad on the Value of the ModelWhy is identity at the core of the "zero trust" approach? Tejas Lagad of Nexus shares insights.

Misconceptions About 'Zero Trust'
2019-12-06 16:18

Forescout's Steven Hunter on How to Ensure Successful DeploymentA common misconception about the "zero trust" model is that once it's deployed, network security is no longer required, says Steven...

Preventing insider threats, data loss and damage through zero trust
2019-11-25 07:00

With the proliferation of mobile devices and BYOD, ubiquitous and always available internet connectivity and the widespread use of private, public and hybrid cloud solutions, eventually all...

'Zero Trust': Can It Be Defined?
2019-11-14 16:18

"Zero trust" is arguably the cybersecurity buzzword of 2019, but what exactly does it mean? Jack Koons of Unisys provides his perspective.

Cisco’s platform enhanced with new zero trust, cloud, endpoint and breach defense capabilities
2019-11-08 04:00

Imagine a world where complexity is no longer the top issue on the minds of CISOs as they think about their security architectures, and a time when they no longer have to stitch together and...

Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security
2019-11-06 22:20

Tactics for when authorized users need to connect to network resources, or need to venture out to the web to complete important tasks.

Fyde’s Zero Trust solution delivers security, connectivity, and productivity upgrades
2019-11-05 03:30

Fyde, the new standard for Zero Trust, announced Fyde Enterprise, a continuous, adaptive secure access solution that mitigates risk while protecting privacy and increasing performance. As digital...