zero trust

The foundation of a holistic identity security strategy
Only 9% of organizations are taking an agile, holistic and mature approach to securing identities throughout their hybrid and multi-cloud environments, according to CyberArk. …

A closer look at TSA’s new cybersecurity requirements for aviation
The Transportation Security Administration (TSA) recently issued new cybersecurity requirements for the aviation industry, which follows last year’s announcement for …

Enhance security while lowering IT overhead in times of recession
“Is cybersecurity recession-proof?” That’s the question on the minds of many security professionals and executives as a possible economic downturn of indeterminate length and …

Reimagining zero trust for modern SaaS
The concept of zero trust – as a way to improve the security of and access to an organization’s network, systems, and data – has gained traction in recent …

Why most IoT cybersecurity strategies give zero hope for zero trust
IoT remains the biggest hurdle in achieving an effective zero-trust security posture across an organization. In this Help Net Security video, Denny LeCompte, CEO at Portnox, …

Zero trust network access for Desktop as a Service
When you support a remote workforce, you risk opening your data, applications, and organization to the world. How can you sleep soundly at night while enabling a modern “work …

Organizations are adopting SSE technology to secure hybrid work
With 88% of organizations supporting a hybrid or remote work model, it’s clear that the way people work has changed. Organizations are realizing that the means in which secure …

Things to know and do before you switch from VPN to ZTNA
Will your organization fall apart if you don’t switch from a VPN to a zero trust network access (ZTNA) solution in the near future? I’m here to tell you it won’t. The reality …

Leveraging the full potential of zero trust
More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, …

Top 7 factors boosting enterprise cybersecurity resilience
Cybersecurity resilience is a top priority for companies as they look to defend against a rapidly evolving threat landscape, according to the latest edition of Cisco’s annual …

Cloud security starts with zero trust
In this interview for Help Net Security, Mark Ruchie, CISO at Entrust, talks about cloud security and how zero trust should be implemented to guarantee overall cloud …

The emergence of zero trust consumers
A survey report from Daon shows 92% of consumers believe that cybersecurity threats will continue to outpace cybersecurity technology, with 91% willing to take extra security …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility