zero trust

Returning to the office? Time to reassess privileged access permissions
As more of the population becomes vaccinated against COVID-19, organizations are preparing to return to the office. In the emerging hybrid environment, where employees can …

C-level cybersecurity attitudes as enterprises embrace the everywhere workplace
Ivanti unveiled the findings of a Frost & Sullivan study which investigates the impact of the COVID-19 pandemic on cybersecurity and compliance attitudes and behaviors in …

The zero trust security market continues to grow
The global zero trust security market is projected to surpass $66,741.3 million, increasing from $18,500.0 million in 2019, at a CAGR of 17.6% from 2020 to 2027 timeframe, …

Pandemic accelerating need for insider risk management
As companies exit the pandemic, security leaders will be challenged with new data security complexities. Remote work over the past year magnified challenges that companies …

Secure your cloud: Remove the human vulnerabilities
Training to increase employees’ security awareness and change risky behaviours among end users is important, particularly as the future workplace will be hybrid and many …

Healthcare organizations implementing zero trust to tackle cyberattacks
It is widely known that the healthcare industry is a primary target for cyberattack, with increasingly sophisticated and highly-motivated adversaries seeking to exploit both …

Push past zero trust barriers to securely connect the distributed workforce
If the past year has taught us anything, it’s that trusting a device simply because it originates from inside a corporate network is not a good idea. If an endpoint is …

What IT leaders are prioritizing in network security investments?
Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a Pulse Media research has found. The survey of 239 …

How micro-segmentation creates an uphill battle for intruders
The past few years have seen a major shift in security strategies from looking outward for external threats to detecting and defending against adversaries that have already …

Approaching zero trust security strategically
With digital transformation efforts accelerating, the attack surface expanding exponentially and conventional perimeter-based security continuing to fail, there’s never been a …

How to address post-pandemic infrastructure pain points
Like bankruptcy, falling asleep, or even falling in love, today’s infrastructure and security pain points develop first gradually, and then all at once. The coronavirus …

Cybersecurity guide for the hospitality industry
A practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility