zero trust

The changing face of identity security

The changing face of identity security 2024-11-12 at 08:03 By Help Net Security It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold of privileged […]

React to this headline:

Loading spinner

The changing face of identity security Read More »

Maximizing security visibility on a budget

Maximizing security visibility on a budget 2024-11-05 at 07:03 By Mirko Zorz In this Help Net Security interview, Barry Mainz, CEO at Forescout, discusses the obstacles organizations encounter in attaining security visibility, particularly within cloud and hybrid environments. He explains why asset intelligence—going beyond basic visibility to understand device behavior and risk—is essential. Mainz also

React to this headline:

Loading spinner

Maximizing security visibility on a budget Read More »

3 easy microsegmentation projects

3 easy microsegmentation projects 2024-10-01 at 07:31 By Help Net Security Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device service connectivity. One web server should connect to specific databases but not to others, or load balancers should connect to some web servers while

React to this headline:

Loading spinner

3 easy microsegmentation projects Read More »

How AI and zero trust are transforming resilience strategies

How AI and zero trust are transforming resilience strategies 2024-09-11 at 07:01 By Mirko Zorz In this Help Net Security interview, John Hernandez, President and General Manager at Quest Software, shares practical advice for enhancing cybersecurity resilience against advanced threats. He underscores the need to focus on on-premises and cloud environments, adapt to new regulations,

React to this headline:

Loading spinner

How AI and zero trust are transforming resilience strategies Read More »

OpenZiti: Secure, open-source networking for your applications

OpenZiti: Secure, open-source networking for your applications 2024-09-09 at 07:33 By Mirko Zorz OpenZiti is a free, open-source project that embeds zero-trust networking principles directly into applications. Example of an OpenZiti overlay network OpenZiti features “We created OpenZiti to transform how people think about connectivity. While OpenZiti is a zero-trust networking platform, you can also

React to this headline:

Loading spinner

OpenZiti: Secure, open-source networking for your applications Read More »

Key metrics for monitoring and improving ZTNA implementations

Key metrics for monitoring and improving ZTNA implementations 2024-08-13 at 07:01 By Mirko Zorz In this Help Net Security interview, Dean Hamilton, CTO at Wilson Perumal & Company, discusses the complexities of zero trust network access (ZTNA) implementation, focusing on balancing security with operational efficiency. Hamilton highlights strategic planning, collaboration between IT and business leaders,

React to this headline:

Loading spinner

Key metrics for monitoring and improving ZTNA implementations Read More »

Record-breaking $75 million ransom paid to cybercrime group

Record-breaking $75 million ransom paid to cybercrime group 2024-08-02 at 07:01 By Help Net Security Ransomware attacks have reached new heights of ambition and audacity over the past year, marked by a notable surge in extortion attacks, according to a Zscaler. The findings from the report uncovered a record-breaking ransom payment of $75 million to

React to this headline:

Loading spinner

Record-breaking $75 million ransom paid to cybercrime group Read More »

Laying the groundwork for zero trust in the military

Laying the groundwork for zero trust in the military 2024-07-18 at 07:01 By Mirko Zorz In this Help Net Security interview, Curtis Arnold, VP and Chief Scientist at Core4ce, discusses the starting points for military training in zero trust principles, emphasizing foundational technologies and a unified taxonomy. Arnold provides insights into the DoD’s Zero Trust

React to this headline:

Loading spinner

Laying the groundwork for zero trust in the military Read More »

Strengthening cybersecurity preparedness with defense in depth

Strengthening cybersecurity preparedness with defense in depth 2024-07-11 at 07:01 By Mirko Zorz In this Help Net Security interview, Chaim Mazal, Chief Security Officer at Gigamon, discusses cybersecurity preparedness measures for businesses, the impact of international inconsistencies on global operations, and the board’s role in cybersecurity. What are the top cybersecurity preparedness measures that businesses

React to this headline:

Loading spinner

Strengthening cybersecurity preparedness with defense in depth Read More »

How AI-powered attacks are accelerating the shift to zero trust strategies

How AI-powered attacks are accelerating the shift to zero trust strategies 2024-06-05 at 07:01 By Mirko Zorz In this Help Net Security interview, Jenn Markey, Advisor to The Entrust Cybersecurity Institute, discusses the increasing adoption of enterprise-wide zero trust strategies in response to evolving cyber threats. Markey discusses the impact of emerging threats like AI-generated

React to this headline:

Loading spinner

How AI-powered attacks are accelerating the shift to zero trust strategies Read More »

Lack of skills and budget slow zero-trust implementation

Lack of skills and budget slow zero-trust implementation 2024-05-31 at 07:02 By Help Net Security The risk of a cyber breach is the number one global driver for zero trust strategy implementation, according to Entrust. The 2024 State of Zero Trust & Encryption Study surveyed over 4,000 IT security practitioners worldwide. The survey shows that

React to this headline:

Loading spinner

Lack of skills and budget slow zero-trust implementation Read More »

Essential steps for zero-trust strategy implementation

Essential steps for zero-trust strategy implementation 2024-05-01 at 06:01 By Help Net Security 63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing a zero-trust strategy, this investment represents less than 25% of the overall cybersecurity budget. A fourth quarter 2023 Gartner survey of 303

React to this headline:

Loading spinner

Essential steps for zero-trust strategy implementation Read More »

Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks

Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks 2024-04-11 at 19:46 By Ryan Naraine Zscaler announces plans to acquire Airgap Networks, a venture-backed startup selling network segmentation and secure access technologies. The post Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks Read More »

Industrial sectors embrace zero trust for enhanced security

Industrial sectors embrace zero trust for enhanced security 2024-04-08 at 06:32 By Help Net Security Organizations are leveraging zero trust to enhance the safety, security, and reliability of their enterprise across IT and OT environments, according to Xage Security. Zero trust security implementation in industrial sectors The report analyzes the current status and trajectory of

React to this headline:

Loading spinner

Industrial sectors embrace zero trust for enhanced security Read More »

Strengthening critical infrastructure cybersecurity is a balancing act

Strengthening critical infrastructure cybersecurity is a balancing act 2024-03-26 at 07:31 By Mirko Zorz In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure cybersecurity strategies, barriers to threat information sharing, and innovative technologies enhancing resilience against cyberattacks. How do current cybersecurity strategies address the critical infrastructure sectors’ unique

React to this headline:

Loading spinner

Strengthening critical infrastructure cybersecurity is a balancing act Read More »

8 cybersecurity predictions shaping the future of cyber defense

8 cybersecurity predictions shaping the future of cyber defense 2024-03-25 at 07:32 By Help Net Security Among Gartner’s top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of generative AI (GenAI). Two-thirds of global 100 organizations are expected to extend directors’ and officers’ insurance

React to this headline:

Loading spinner

8 cybersecurity predictions shaping the future of cyber defense Read More »

The double-edged sword of zero trust

The double-edged sword of zero trust 2024-02-19 at 06:01 By Help Net Security In an era defined by relentless cyber threats and evolving attack vectors, traditional security models are proving increasingly inadequate to safeguard sensitive information. Unlike conventional systems that often rely on perimeter defenses, zero trust adopts a more discerning philosophy, treating every user,

React to this headline:

Loading spinner

The double-edged sword of zero trust Read More »

How CISOs navigate policies and access across enterprises

How CISOs navigate policies and access across enterprises 2024-02-06 at 08:01 By Mirko Zorz In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and access controls in a distributed enterprise. He also highlights the significance of security validations, especially internal

React to this headline:

Loading spinner

How CISOs navigate policies and access across enterprises Read More »

Zero trust implementation: Plan, then execute, one step at a time

Zero trust implementation: Plan, then execute, one step at a time 2024-02-01 at 08:02 By Helga Labus 82% of cybersecurity professionals have been working on implementing zero trust last year, and 16% should be on it by the end of this year. The challenges of zero trust implementation You’ve probably heard it before: zero trust

React to this headline:

Loading spinner

Zero trust implementation: Plan, then execute, one step at a time Read More »

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management 2024-01-31 at 07:31 By Mirko Zorz In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of complex cyberattacks and the role of the zero-trust model. The conversation also covers the essential steps for a

React to this headline:

Loading spinner

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management Read More »

Scroll to Top