zero trust

Balancing cybersecurity with convenience and progress

Balancing cybersecurity with convenience and progress 25/09/2023 at 07:02 By Help Net Security Changing approaches to cybersecurity have led to slow but steady progress in defense and protection. Still, competing interests create a growing challenge for cybersecurity decision makers and practitioners, according to CompTIA. The state of cybersecurity Most business and technology professionals feel that […]

React to this headline:

Loading spinner

Balancing cybersecurity with convenience and progress Read More »

Navigating the Digital Frontier in Cybersecurity Awareness Month 2023

Navigating the Digital Frontier in Cybersecurity Awareness Month 2023 21/09/2023 at 20:01 By Torsten George ZTNA stands out as a solution that enables organizations to minimize their attack surface while ensuring the productivity and security of their remote workforce. The post Navigating the Digital Frontier in Cybersecurity Awareness Month 2023 appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Navigating the Digital Frontier in Cybersecurity Awareness Month 2023 Read More »

Access control in cloud-native applications in multi-location environments (NIST SP 800-207)

Access control in cloud-native applications in multi-location environments (NIST SP 800-207) 14/09/2023 at 11:47 By Help Net Security NIST released Special Publication (SP) 800-207A – “A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location Environments.” Enterprise application environments consist of geographically distributed and loosely coupled microservices that span multiple cloud and

React to this headline:

Loading spinner

Access control in cloud-native applications in multi-location environments (NIST SP 800-207) Read More »

Elevating API security to reinforce cyber defense

Elevating API security to reinforce cyber defense 11/09/2023 at 06:32 By Help Net Security While APIs are essential to many operations and used extensively, a lack of prioritization and understanding is leading us towards a growing API security crisis, according to a report by Traceable AI and Ponemon Institute. The urgency for API security Within

React to this headline:

Loading spinner

Elevating API security to reinforce cyber defense Read More »

Avoidable digital certificate issues fuel data breaches

Avoidable digital certificate issues fuel data breaches 06/09/2023 at 06:02 By Help Net Security Among organizations that have suffered data breaches 58% were caused by issues related to digital certificates, according to a report by AppViewX and Forrester Consulting. As a result of service outages, 57% said their organizations have incurred costs upwards of $100,000

React to this headline:

Loading spinner

Avoidable digital certificate issues fuel data breaches Read More »

Adapting authentication to a cloud-centric landscape

Adapting authentication to a cloud-centric landscape 28/08/2023 at 07:33 By Mirko Zorz In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote workforces, the negative consequences of ineffective authorization, and how the shift toward cloud transformation affects authentication strategies. What are

React to this headline:

Loading spinner

Adapting authentication to a cloud-centric landscape Read More »

Experts demand clarity as they struggle with cloud security prioritization

Experts demand clarity as they struggle with cloud security prioritization 28/08/2023 at 06:32 By Help Net Security Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of comprehensively securing multi-cloud environments, according to Cloud Security Alliance. Secure cloud computing environment Much of

React to this headline:

Loading spinner

Experts demand clarity as they struggle with cloud security prioritization Read More »

Google Workspace Introduces New AI-Powered Security Controls

Google Workspace Introduces New AI-Powered Security Controls 25/08/2023 at 14:47 By Ionut Arghire Google has announced new AI-powered zero trust, digital sovereignty, and threat defense controls for Workspace customers. The post Google Workspace Introduces New AI-Powered Security Controls appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Google Workspace Introduces New AI-Powered Security Controls Read More »

Webinar Tomorrow:  ZTNA Superpowers CISOs Should Know

Webinar Tomorrow:  ZTNA Superpowers CISOs Should Know 21/08/2023 at 15:32 By SecurityWeek News Join Cloudflare and SecurityWeek for a webinar to discuss “VPN Replacement: Other ZTNA Superpowers CISOs Should Know” The post Webinar Tomorrow:  ZTNA Superpowers CISOs Should Know appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Webinar Tomorrow:  ZTNA Superpowers CISOs Should Know Read More »

Network detection and response in the modern era

Network detection and response in the modern era 21/08/2023 at 07:04 By Mirko Zorz In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role of Network Detection and Response (NDR) solutions that leverage machine learning algorithms to

React to this headline:

Loading spinner

Network detection and response in the modern era Read More »

Reinventing OT security for dynamic landscapes

Reinventing OT security for dynamic landscapes 18/08/2023 at 07:05 By Mirko Zorz From understanding the challenges of disparate OT protocols and the increasing convergence with IT to grappling with the monumental role of human error, our latest interview with Rohit Bohara, CTO at asvin, delves deep into the landscape of OT security. As cloud solutions

React to this headline:

Loading spinner

Reinventing OT security for dynamic landscapes Read More »

30% of phishing threats involve newly registered domains

30% of phishing threats involve newly registered domains 18/08/2023 at 05:31 By Help Net Security Phishing remains the most dominant and fastest growing internet crime, largely due to the ubiquity of email and the ceaseless issue of human error that is preyed upon by today’s threat actors, according to Cloudflare. While business email compromise (BEC)

React to this headline:

Loading spinner

30% of phishing threats involve newly registered domains Read More »

Federal agencies gear up for zero trust executive order deadline

Federal agencies gear up for zero trust executive order deadline 18/08/2023 at 05:04 By Help Net Security Federal agencies are prepared to meet the zero trust executive order requirements from the Biden Administration with just over a year until the deadline, according to Swimlane. The research investigated the confidence level of these agencies in meeting

React to this headline:

Loading spinner

Federal agencies gear up for zero trust executive order deadline Read More »

Balancing telecom security, law enforcement, and customer trust

Balancing telecom security, law enforcement, and customer trust 15/08/2023 at 07:48 By Mirko Zorz In this Help Net Security interview, Mark O’Neill, CTO at BlackDice Cyber, talks about collaboration, transparent policies, and a security-first mindset. As 5G and IoT emerge, robust measures and AI will navigate challenges and shape the telecom industry’s future. Considering the

React to this headline:

Loading spinner

Balancing telecom security, law enforcement, and customer trust Read More »

VPNs remain a risky gamble for remote access

VPNs remain a risky gamble for remote access 04/08/2023 at 06:33 By Help Net Security Organizations are expressing deep concerns about their network security due to the risks from VPNs, according to a new Zscaler report. The report stresses the need for organizations to reevaluate their security posture and migrate to a zero-trust architecture due

React to this headline:

Loading spinner

VPNs remain a risky gamble for remote access Read More »

CISOs consider zero trust a hot security ticket

CISOs consider zero trust a hot security ticket 28/07/2023 at 06:02 By Help Net Security The majority of organizations are on the road to implementing a zero trust framework to increase their overall security risk posture, according to PlainID. However, only 50% said that authorization makes up their zero trust program – potentially exposing their

React to this headline:

Loading spinner

CISOs consider zero trust a hot security ticket Read More »

Zero trust rated as highly effective by businesses worldwide

Zero trust rated as highly effective by businesses worldwide 26/07/2023 at 06:33 By Help Net Security Zero trust is here to stay, with 82% of experts currently working on implementing zero trust, and 16% planning to begin within 18 months, according to Beyond Identity. Over 90% of those working on zero trust cited that the

React to this headline:

Loading spinner

Zero trust rated as highly effective by businesses worldwide Read More »

CISOs are making cybersecurity a business problem

CISOs are making cybersecurity a business problem 21/07/2023 at 06:02 By Help Net Security U.S. enterprises are responding to growing cybersecurity threats by working to make the best use of tools and services to ensure business resilience, according to ISG. Enterprises face growing cybersecurity threats The report for the U.S. finds that the U.S. security

React to this headline:

Loading spinner

CISOs are making cybersecurity a business problem Read More »

CISOs under pressure: Protecting sensitive information in the age of high employee turnover

CISOs under pressure: Protecting sensitive information in the age of high employee turnover 17/07/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks about how zero trust principles, identity access management, and managed security services are crucial for

React to this headline:

Loading spinner

CISOs under pressure: Protecting sensitive information in the age of high employee turnover Read More »

Overcoming user resistance to passwordless authentication

Overcoming user resistance to passwordless authentication 10/07/2023 at 07:14 By Help Net Security Many organizations agree in theory that passwordless authentication is the future, but getting there represents a significant change management challenge. The migration to passwordless requires forethought and planning. For example, an organization needs to establish strategic imperatives around security, the user experience,

React to this headline:

Loading spinner

Overcoming user resistance to passwordless authentication Read More »

Scroll to Top