Refresh

This website securityticks.com/category/zero-trust/page/2/ is currently offline. Cloudflare's Always Online™ shows a snapshot of this web page from the Internet Archive's Wayback Machine. To check for the live version, click Refresh.

zero trust

Industrial sectors embrace zero trust for enhanced security

Industrial sectors embrace zero trust for enhanced security 2024-04-08 at 06:32 By Help Net Security Organizations are leveraging zero trust to enhance the safety, security, and reliability of their enterprise across IT and OT environments, according to Xage Security. Zero trust security implementation in industrial sectors The report analyzes the current status and trajectory of […]

React to this headline:

Loading spinner

Industrial sectors embrace zero trust for enhanced security Read More »

Strengthening critical infrastructure cybersecurity is a balancing act

Strengthening critical infrastructure cybersecurity is a balancing act 2024-03-26 at 07:31 By Mirko Zorz In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure cybersecurity strategies, barriers to threat information sharing, and innovative technologies enhancing resilience against cyberattacks. How do current cybersecurity strategies address the critical infrastructure sectors’ unique

React to this headline:

Loading spinner

Strengthening critical infrastructure cybersecurity is a balancing act Read More »

8 cybersecurity predictions shaping the future of cyber defense

8 cybersecurity predictions shaping the future of cyber defense 2024-03-25 at 07:32 By Help Net Security Among Gartner’s top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of generative AI (GenAI). Two-thirds of global 100 organizations are expected to extend directors’ and officers’ insurance

React to this headline:

Loading spinner

8 cybersecurity predictions shaping the future of cyber defense Read More »

The double-edged sword of zero trust

The double-edged sword of zero trust 2024-02-19 at 06:01 By Help Net Security In an era defined by relentless cyber threats and evolving attack vectors, traditional security models are proving increasingly inadequate to safeguard sensitive information. Unlike conventional systems that often rely on perimeter defenses, zero trust adopts a more discerning philosophy, treating every user,

React to this headline:

Loading spinner

The double-edged sword of zero trust Read More »

How CISOs navigate policies and access across enterprises

How CISOs navigate policies and access across enterprises 2024-02-06 at 08:01 By Mirko Zorz In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and access controls in a distributed enterprise. He also highlights the significance of security validations, especially internal

React to this headline:

Loading spinner

How CISOs navigate policies and access across enterprises Read More »

Zero trust implementation: Plan, then execute, one step at a time

Zero trust implementation: Plan, then execute, one step at a time 2024-02-01 at 08:02 By Helga Labus 82% of cybersecurity professionals have been working on implementing zero trust last year, and 16% should be on it by the end of this year. The challenges of zero trust implementation You’ve probably heard it before: zero trust

React to this headline:

Loading spinner

Zero trust implementation: Plan, then execute, one step at a time Read More »

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management 2024-01-31 at 07:31 By Mirko Zorz In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of complex cyberattacks and the role of the zero-trust model. The conversation also covers the essential steps for a

React to this headline:

Loading spinner

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management Read More »

Out with the old and in with the improved: MFA needs a revamp

Out with the old and in with the improved: MFA needs a revamp 2024-01-19 at 08:02 By Help Net Security From AI to ZTA (zero-trust architecture), the technology responsible for protecting your company’s data has evolved immensely. Despite the advances, cybercriminals repeatedly find new and creative ways to gain access to sensitive information. This can

React to this headline:

Loading spinner

Out with the old and in with the improved: MFA needs a revamp Read More »

Understanding zero-trust design philosophy and principles

Understanding zero-trust design philosophy and principles 2024-01-09 at 07:32 By Mirko Zorz In this Help Net Security interview, Phil Vachon, Head of Infrastructure in the Office of the CTO at Bloomberg, discusses the varying definitions of zero trust among security professionals and companies, emphasizing its broad design philosophy. Vachon explores challenges in implementing zero trust,

React to this headline:

Loading spinner

Understanding zero-trust design philosophy and principles Read More »

Why zero-trust segmentation is critical for cloud resilience

Why zero-trust segmentation is critical for cloud resilience 06/12/2023 at 07:31 By Help Net Security Nearly all organizations rely on the cloud to store sensitive data and run critical systems. But for many, cloud security hasn’t kept up. 93% agree that zero-trust segmentation is essential to their cloud security strategy. In this Help Net Security

React to this headline:

Loading spinner

Why zero-trust segmentation is critical for cloud resilience Read More »

Strategies for cultivating a supportive culture in zero-trust adoption

Strategies for cultivating a supportive culture in zero-trust adoption 29/11/2023 at 08:01 By Mirko Zorz In this Help Net Security interview, Wolfgang Goerlich, Advisory CISO at Cisco, discusses the benefits of implementing a mature zero-trust model for both security and business outcomes, revealing a decrease in reported security incidents and enhanced adaptability. Goerlich emphasizes the

React to this headline:

Loading spinner

Strategies for cultivating a supportive culture in zero-trust adoption Read More »

Smaller businesses embrace GenAI, overlook security measures

Smaller businesses embrace GenAI, overlook security measures 20/11/2023 at 08:02 By Help Net Security Organizations are feeling the pressure to rush into generative AI (GenAI) tool usage, despite significant security concerns, according to Zscaler. More than 900 global IT decision makers, although 89% of organizations consider GenAI tools like ChatGPT to be a potential security

React to this headline:

Loading spinner

Smaller businesses embrace GenAI, overlook security measures Read More »

Traditional cloud security isn’t up to the task

Traditional cloud security isn’t up to the task 17/11/2023 at 09:02 By Help Net Security In the last year, 47% of all data breaches originated in the cloud, and more than 6 in 10 respondents believe cloud security is lacking and poses a severe risk to their business operations, according to Illumio. The average organization

React to this headline:

Loading spinner

Traditional cloud security isn’t up to the task Read More »

AI disinformation campaigns pose major threat to 2024 elections

AI disinformation campaigns pose major threat to 2024 elections 17/11/2023 at 08:32 By Help Net Security AI, post-quantum cryptography, zero trust, cryptography research, and election security will shape cybersecurity strategies in the present and for 2024, according to NTT. As the world emerged from the pandemic and continued to adapt to the rapid implementation of

React to this headline:

Loading spinner

AI disinformation campaigns pose major threat to 2024 elections Read More »

Microsegmentation proves its worth in ransomware defense

Microsegmentation proves its worth in ransomware defense 07/11/2023 at 07:32 By Help Net Security The number of ransomware attacks (successful and unsuccessful) has doubled over the past two years, from 43 on average in 2021 to 86 in 2023, according to Akamai. Security organizations have responded to the recent rise in ransomware attacks by implementing

React to this headline:

Loading spinner

Microsegmentation proves its worth in ransomware defense Read More »

Cybersecurity workforce shortages: 67% report people deficits

Cybersecurity workforce shortages: 67% report people deficits 02/11/2023 at 09:02 By Help Net Security The global cybersecurity workforce has reached 5.5 million people, an 8.7% increase from 2022, representing 440,000 new jobs, according to ISC2. While this is the highest workforce ever recorded, the report shows that demand is still outpacing the supply. The cybersecurity

React to this headline:

Loading spinner

Cybersecurity workforce shortages: 67% report people deficits Read More »

Extending ZTNA to Protect Against Insider Threats

Extending ZTNA to Protect Against Insider Threats 31/10/2023 at 15:31 By Etay Maor One of the main reasons why ZTNA fails is that most ZTNA implementations tend to focus entirely on securing remote access. The post Extending ZTNA to Protect Against Insider Threats appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Extending ZTNA to Protect Against Insider Threats Read More »

IoT security threats highlight the need for zero trust principles

IoT security threats highlight the need for zero trust principles 27/10/2023 at 07:31 By Help Net Security The high number of attacks on IoT devices represents a 400% increase in malware compared to the previous year, according to Zscaler. The increasing frequency of malware attacks targeting IoT devices is a significant concern for OT security,

React to this headline:

Loading spinner

IoT security threats highlight the need for zero trust principles Read More »

OT cyber attacks proliferating despite growing cybersecurity spend

OT cyber attacks proliferating despite growing cybersecurity spend 26/10/2023 at 07:32 By Help Net Security The sharp increase in attacks on operational technology (OT) systems can be primarily attributed to two key factors: the escalating global threats posed by nation-state actors and the active involvement of profit-driven cybercriminals (often sponsored by the former). The lack

React to this headline:

Loading spinner

OT cyber attacks proliferating despite growing cybersecurity spend Read More »

Why zero trust delivers even more resilience than you think

Why zero trust delivers even more resilience than you think 10/10/2023 at 08:04 By Help Net Security Ten years ago, zero trust was an exciting, innovative perspective shift that security experts were excited to explore; today, it’s more likely to be framed as an inevitable trend than as a mere option on the security menu.

React to this headline:

Loading spinner

Why zero trust delivers even more resilience than you think Read More »

Scroll to Top