Security News

Cloud security starts with zero trust
2022-11-28 06:00

In this interview for Help Net Security, Mark Ruchie, CISO at Entrust, talks about cloud security and how zero trust should be implemented to guarantee overall cloud protection. Generally speaking, the best way for an organization to approach zero trust is for security teams to take the mindset that the network is already compromised and develop security protocols from there.

Security At The Forefront: A Spotlight On Zero Trust
2022-11-28 00:00

You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.

The emergence of zero trust consumers
2022-11-24 04:00

These attitudes signal an emergence of zero trust consumers. The report, The Era of the Zero Trust Consumer, is based on a survey of over 2,000 U.S. and over 1,000 U.K. consumers conducted in October 2022.

Moving your Microsoft environment to zero trust
2022-11-15 04:30

How can an organization build out a zero trust environment with diverse Microsoft technologies? A modern identity management and authentication framework is at the center of everything and must integrate seamlessly with Active Directory and cloud environments like Azure. Although Microsoft has established itself as a leader in the enterprise identity and security space with Azure AD and Windows Hello, they do not address the full spectrum of enterprise identity requirements, particularly as organizations expand beyond Windows workstation and Microsoft cloud environments.

Zero Trust at Scale eBook
2022-11-10 00:00

You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.

Most missed area of zero trust: Unmanageable applications
2022-11-01 05:00

In this Help Net Security video, Matthew Chiodi, Chief Trust Officer of Cerby, talks about the likely hole in your security strategy. This video zeroes in on one of the most important yet often missed areas of zero trust: unmanageable applications, which leading analysts say contribute to a third of all security breaches.

Zero trust: Data-centric culture to accelerate innovation and secure digital business
2022-10-14 11:48

Traditional layers of security assume users and data are always operating within the confines of the enterprise walls and data centers - like a physical store. One of the biggest mistakes organizations make when structuring their zero-trust strategy is to associate zero trust with infrastructure assets, such as network and devices, when its purpose is to serve as a principle to protect data as a strategic asset for the organization to use in a continuous manner.

Zero Trust Access for Dummies
2022-10-12 00:00

As businesses continue to embrace digital innovation, cloud applications, and the new work-from-anywhere normal, enterprise networks have become far more complicated and dispersed with an ever growing number of edges. As a result, the network perimeter has all but disappeared.

Improve Application Access and Security With Fortinet Zero Trust Network Access
2022-10-12 00:00

The massive shift from working in an office to working at home has highlighted many security and connectivity challenges. It's critical for organizations to enable secure access from anywhere to any application - while applying consistent security policies.

The State of Zero Trust Report
2022-10-12 00:00

The zero-trust network security model has become a pervasive topic for IT professionals. Many organizations have a vision of what they want or need in terms of zero-trust and zero-trust network access, but the completeness of their vision isn't necessarily being translated into the solutions they're able to put in place.