Security News

API authentication failures demonstrate the need for zero trust
2022-10-05 05:30

Authenticating an API requires the developer to have a complete understanding of the transaction - from the user interaction through to the outcome - so it requires them to go beyond the limits of the API specification itself. These range from HTTPS and a username and password to API keys which generate a unique string of characters for each OAuth authentication request, which sees developers use a well-known authorization framework to automatically orchestrate approvals.

Why zero trust should be the foundation of your cybersecurity ecosystem
2022-09-27 03:00

The answer: Adopt a zero trust approach to cybersecurity. The guide explains how your organization can design a zero trust implementation strategy, select an appropriate methodology, assemble the right tools, and execute the implementation plan for successful zero trust adoption.

Introducing the book: Project Zero Trust
2022-09-26 04:30

In this Help Net Security video interview, George Finney, CSO at Southern Methodist University, talks about his latest book - "Project Zero Trust: A Story about a Strategy for Aligning Security and the Business". Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT Security Director.

Why Zero Trust Should be the Foundation of Your Cybersecurity Ecosystem
2022-09-21 12:00

The answer: Adopt a zero trust approach to cybersecurity. The guide explains how your organization can design a zero trust implementation strategy, select an appropriate methodology, assemble the right tools, and execute the implementation plan for successful zero trust adoption.

Start Your Zero Trust Journey With Identity
2022-09-14 00:00

Cybersecurity is a serious concern for every organisation today. With 61% of cyberattacks now involving stolen or weak credentials, IT and Security leaders face immense pressures to close the gaps that let bad actors in and protect their customers, workforce, and reputations from harm.

Modernizing data security with a zero trust approach to data access
2022-09-13 05:00

There is a practical zero trust model for data security every company can follow with such a model heeding data access at the start. There are many reasons why companies need to consider a unified, zero trust approach to their data access as part of their data protection strategy - both in terms of value and risk.

ThreatLocker announces new features to strengthen zero trust security
2022-09-08 01:30

ThreatLocker has announced the launch of its newest software add-on; an in-cloud learning feature that will help businesses to strengthen their zero trust security posture. When users request new applications after the endpoints have been secured, system administrators need to make a judgement as to whether to allow the application.

Zero Trust at Scale
2022-09-01 00:00

Since incorporating controls for device health and trust at the application layer, our ability to react to device risk has substantially improved. There are approximately 2.6 million device health checks automatically conducted per month.

A Dramatic Shift in Network Security with Zero Trust Edge Strategy
2022-08-26 00:00

Most organizations are deep into a phase of major growth and evolution that's called "Digital acceleration." The goal of digital acceleration for organizations is to adapt and thrive-despite the global pandemic and the nonstop introduction of new cyber threats. Digital acceleration has led to a rapid expansion of attack surfaces and creation of new network edges, including LAN, WAN, 5G, and multi-cloud.

The factors driving today’s accelerated zero trust adoption
2022-08-18 03:30

Zero trust has quickly progressed from a buzzword to a critical business imperative, Okta's 2022 State of Zero Trust Security Report has found. EMEA businesses are dragging their feet on zero trust strategy - but budgets are on the rise.