Security News

The emergence of zero trust consumers
2022-11-24 04:00

These attitudes signal an emergence of zero trust consumers. The report, The Era of the Zero Trust Consumer, is based on a survey of over 2,000 U.S. and over 1,000 U.K. consumers conducted in October 2022.

Moving your Microsoft environment to zero trust
2022-11-15 04:30

How can an organization build out a zero trust environment with diverse Microsoft technologies? A modern identity management and authentication framework is at the center of everything and must integrate seamlessly with Active Directory and cloud environments like Azure. Although Microsoft has established itself as a leader in the enterprise identity and security space with Azure AD and Windows Hello, they do not address the full spectrum of enterprise identity requirements, particularly as organizations expand beyond Windows workstation and Microsoft cloud environments.

Zero Trust at Scale eBook
2022-11-10 00:00

You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.

Most missed area of zero trust: Unmanageable applications
2022-11-01 05:00

In this Help Net Security video, Matthew Chiodi, Chief Trust Officer of Cerby, talks about the likely hole in your security strategy. This video zeroes in on one of the most important yet often missed areas of zero trust: unmanageable applications, which leading analysts say contribute to a third of all security breaches.

Zero trust: Data-centric culture to accelerate innovation and secure digital business
2022-10-14 11:48

Traditional layers of security assume users and data are always operating within the confines of the enterprise walls and data centers - like a physical store. One of the biggest mistakes organizations make when structuring their zero-trust strategy is to associate zero trust with infrastructure assets, such as network and devices, when its purpose is to serve as a principle to protect data as a strategic asset for the organization to use in a continuous manner.

Zero Trust Access for Dummies
2022-10-12 00:00

As businesses continue to embrace digital innovation, cloud applications, and the new work-from-anywhere normal, enterprise networks have become far more complicated and dispersed with an ever growing number of edges. As a result, the network perimeter has all but disappeared.

Improve Application Access and Security With Fortinet Zero Trust Network Access
2022-10-12 00:00

The massive shift from working in an office to working at home has highlighted many security and connectivity challenges. It's critical for organizations to enable secure access from anywhere to any application - while applying consistent security policies.

The State of Zero Trust Report
2022-10-12 00:00

The zero-trust network security model has become a pervasive topic for IT professionals. Many organizations have a vision of what they want or need in terms of zero-trust and zero-trust network access, but the completeness of their vision isn't necessarily being translated into the solutions they're able to put in place.

API authentication failures demonstrate the need for zero trust
2022-10-05 05:30

Authenticating an API requires the developer to have a complete understanding of the transaction - from the user interaction through to the outcome - so it requires them to go beyond the limits of the API specification itself. These range from HTTPS and a username and password to API keys which generate a unique string of characters for each OAuth authentication request, which sees developers use a well-known authorization framework to automatically orchestrate approvals.

Why zero trust should be the foundation of your cybersecurity ecosystem
2022-09-27 03:00

The answer: Adopt a zero trust approach to cybersecurity. The guide explains how your organization can design a zero trust implementation strategy, select an appropriate methodology, assemble the right tools, and execute the implementation plan for successful zero trust adoption.