Security News

In this edition of the ISMG Security Report, former federal CISO Gregory Touhill explains why a zero-trust security model is essential, and Ron Ross of NIST describes initiatives to protect...

Aporeto released the Zero Trust security solution on Amazon Web Services (AWS) Marketplace for Containers. AWS customers can now use the Amazon Elastic Container Service (Amazon ECS) console and...

Zero trust refers to the notion of evaluating the security risk of devices and users within the context of any given moment, without automatically conferring access based on credentials.

Lookout’s new approach to cybersecurity is designed to protect businesses as their employees work from outside the corporate perimeter. With integrations to Okta, VMware and other technology...

Hackers Can Gain Network Access Via Social Engineering and Wait for New Zero-Day Exploits to Elevate Their Privilege read more

Zscaler announced that Zscaler Private Access-Government (ZPA-Government), its application access platform, meets the Federal Risk and Authorization Management Program (FedRAMP) Moderate security...

eSentire and Cyxtera Technologies announced a partnership to bring customers security solutions designed to secure today’s hybrid IT environment. The partnership combines eSentire’s 24×7 MDR with...

A new study conducted by Forrester Consulting found that organizations powering Zero Trust Security with next-gen access solutions reported twice the confidence to accelerate new business models...

Okta announced it has acquired ScaleFT. Together, Okta and ScaleFT will bring Zero Trust to the enterprise by providing organizations with a framework to protect data, without compromising on...

Doug Copley of Duo Security on Going Beyond a Focus on the PerimeterEvery application should be protected the same way no matter where it resides, rather than focusing on a "perimeter" approach,...