Security News

Six steps for implementing zero trust access
2019-10-18 05:30

Modern organizations are no longer governed by fixed perimeters. In fact, the perimeter-based security model is disintegrating in a world where users work on their own devices from anywhere, and...

How 'Zero Trust' Better Secures Applications and Access
2019-10-17 16:33

Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero-trust principles, including least privilege, based on the understanding...

NIST's Zero Trust Taxonomy Introduces Components, Threats and Migration Routes
2019-10-07 14:24

NIST has published a draft Zero Trust Architecture (ZTA) special publication (SP.800.207). The purpose is to develop a technology-neutral lexicon of the logical components of a zero trust...

Towerwall becomes a reseller of Safe-T’s Zero Trust suite of products
2019-09-04 00:30

Safe-T Group is pleased to announce that Towerwall, one of the leading cybersecurity solution providers in the United States, has partnered with Safe-T as a reseller of Safe-T’s Zero Trust suite...

Sorting Through 'Zero Trust' Misconceptions
2019-08-27 18:33

F. Wade Holloway of Forescout on the Potential Benefits of the ApproachF. Ward Holloway of Forescout Technologies sorts through what he sees as common misconceptions about the "zero trust"...

Access and Identity: With 'Zero Trust,' Less Is More
2019-08-27 17:33

Marku Rossi of SSH Communications Security on Delivering Right Access Privileges at Right TimeMore organizations are applying a highly automated "zero trust" model to ensure that they only give...

Three essential elements of a successful Zero Trust cybersecurity program
2019-08-21 05:30

Organizations have traditionally deployed cybersecurity approaches that adhered to the phrase made famous by President Ronald Reagan: “Trust, but verify.” This meant that most users and activities...

Tips for Successful Zero-Trust Implementation
2019-08-12 17:22

"Never trust, always verify" is a solid security concept -- but it's important to realize that putting it into practice can be complex.

Aporeto launches zero trust cloud security solution for Kubernetes multi-cluster deployments
2019-08-08 01:00

Aporeto, the leader in Zero Trust Cloud Security, announced its cloud network security solution for seamless distributed policy management across Kubernetes multi-cluster and container...