Security News

Webinar – Leverage Zero Trust Security to Minimize Your Attack Surface
2024-01-08 09:01

Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit the vulnerabilities stemming from software and...

Why zero-trust segmentation is critical for cloud resilience
2023-12-06 04:30

Nearly all organizations rely on the cloud to store sensitive data and run critical systems. 93% agree that zero-trust segmentation is essential to their cloud security strategy.

Strategies for cultivating a supportive culture in zero-trust adoption
2023-11-29 05:00

Goerlich emphasizes the role of organizational culture in successfully adopting zero trust, outlines strategies for cultivating a supportive culture, and talks about future trends in the evolution of the zero-trust model. We've seen measurable increases in the security function's ability to keep up with the business, adapt to external events, and create a security culture.

IoT security threats highlight the need for zero trust principles
2023-10-27 04:30

ThreatLabz focused on understanding IoT device activity and attributes via device fingerprinting and analyzing the IoT malware threat landscape. By adopting a zero trust architecture, organizations can gain visibility into IoT device traffic and minimize IoT security risks.

Why zero trust delivers even more resilience than you think
2023-10-10 05:00

Ten years ago, zero trust was an exciting, innovative perspective shift that security experts were excited to explore; today, it's more likely to be framed as an inevitable trend than as a mere option on the security menu. While adopting ZTNA certainly is a major project, for which business leaders should anticipate long timelines and complicated decisions, it should also be seen as an important tactic for reaching a more sustainable financial footing.

How To Implement Zero Trust: Best Practices and Guidelines
2023-09-28 16:23

Implement a Zero Trust security model with confidence with these best practices and tool suggestions to secure your organization. The core components of zero trust include least privileged access policies, network segmentation and access management.

Google AI in Workspace Adds New Zero-Trust and Digital Sovereignty Controls
2023-08-24 18:05

Google announced security enhancements to Google Workspace focused on enhancing threat defense controls with Google AI. At a Google Cloud press event on Tuesday, the company announced Google Cloud's rollout over the course of this year of new AI-powered data security tools bringing zero-trust features to Workspace, Drive, Gmail and data sovereignty.The focus of the new enhancements across Google Drive includes a slew of zero-trust aligned, AI-powered enhancements to its cloud-native architecture, according to Google, which said AI will drive automated data labeling and classification to defend against exfiltration attempts by threat actors.

The Vulnerability of Zero Trust: Lessons from the Storm 0558 Hack
2023-08-18 11:49

Analysts, on the other hand, understand that Zero Trust can only be achieved with comprehensive insight into one's own network. This has increased the percentage of Zero Trust advocates from 24% to 55%. The security model known as Zero Trust is an overarching security strategy designed to continuously audit and verify access to resources, both internally and externally.

Federal agencies gear up for zero trust executive order deadline
2023-08-18 02:00

Federal agencies are prepared to meet the zero trust executive order requirements from the Biden Administration with just over a year until the deadline, according to Swimlane. 67% of government agencies are confident or very confident they are prepared to meet the zero trust requirements laid out by the U.S. government's Memorandum M-22-09, which includes implementing security orchestration, automation, and response technology.

CISOs consider zero trust a hot security ticket
2023-07-28 03:00

The majority of organizations are on the road to implementing a zero trust framework to increase their overall security risk posture, according to PlainID. However, only 50% said that authorization makes up their zero trust program - potentially exposing their infrastructure to threat actors. Historically, a zero trust framework was focused on solving the challenges associated with authentication, end point and network access security.