Security News

Federal agencies are prepared to meet the zero trust executive order requirements from the Biden Administration with just over a year until the deadline, according to Swimlane. 67% of government agencies are confident or very confident they are prepared to meet the zero trust requirements laid out by the U.S. government's Memorandum M-22-09, which includes implementing security orchestration, automation, and response technology.

The majority of organizations are on the road to implementing a zero trust framework to increase their overall security risk posture, according to PlainID. However, only 50% said that authorization makes up their zero trust program - potentially exposing their infrastructure to threat actors. Historically, a zero trust framework was focused on solving the challenges associated with authentication, end point and network access security.

Zero trust is here to stay, with 82% of experts currently working on implementing zero trust, and 16% planning to begin within 18 months, according to Beyond Identity. Over 90% of those working on zero trust cited that the 2022 Federal Zero Trust Strategy was a primary motivating factor.

Migrating to the cloud does not alleviate an organization's cyber risk, nor does it transfer the risk to the CSP. Instead, it requires a shared security model where roles and responsibilities are clearly defined. While the shared security model does make some aspects of cloud security easier, managing the risk of exploitation by sophisticated cyber threat actors is not one of them.

"Although more organizations are implementing a zero-trust strategy, they still face challenges related to integration. To successfully implement zero trust, organizations need solutions that are designed to converge networking and security and have the ability to span multiple environments," said John Maddison, EVP Products and CMO at Fortinet. Zero-trust implementation strategies Organizations of all sizes are working to implement zero-trust strategies.

Rather, a complex multicloud landscape requires a zero trust approach to protecting data. Functionally, zero trust in a multicloud environment is like the security protocols people encounter as they navigate airports en route to their destinations.

Zscaler Deception is a state-of-the-art next-generation deception technology seamlessly integrated with the Zscaler Zero Trust Exchange. We're hosting a session where we'll demonstrate how you can set up Zscaler Deception to detect advanced attacks, investigate threats, and contain them.

Zero trust adoption is beginning to accelerate as networks get more complex. Adoption has been slow; according to a 2023 PWC report, only 36% have started their journey to zero trust.

This has driven the need for a zero trust approach and identity solutions. Over 70% of companies are still in the process of implementing a zero trust approach needed to secure an expanding security perimeter due to increased cloud utilization and remote workers.

In this Help Net Security video, Michael Peters, Principal Software Engineer at Red Hat, discusses how to implement a zero-trust system that uses workload identity across a service mesh in...