#zero-trust

[ follow ]
#cybersecurity
fromHackernoon
3 months ago
Privacy technologies

Beyond the Perimeter: Architecting Trust in the Cloud-Native Era by Mohit Kumar Singh | HackerNoon

Information security
fromIT Pro
1 month ago

Research shows the financial benefits of implementing zero trust

Zero trust security could prevent nearly a third of cyber attacks globally, saving up to $465 billion in financial losses annually.
Digital life
fromSiliconANGLE
1 month ago

Exploring Zscaler's "zero trust everywhere" approach - SiliconANGLE

Zero trust cybersecurity is essential in combating today's threats, focusing on users and workloads' security.
fromHackernoon
3 months ago
Privacy technologies

Beyond the Perimeter: Architecting Trust in the Cloud-Native Era by Mohit Kumar Singh | HackerNoon

fromIT Pro
1 month ago
Information security

Research shows the financial benefits of implementing zero trust

#ai
Privacy professionals
fromZDNET
4 months ago

Microsoft's new AI agents aim to help security pros combat the latest threats

Microsoft is launching AI agents integrated with its Security Copilot program to enhance organizational security against modern threats.
Privacy professionals
fromZDNET
4 months ago

Microsoft's new AI agents aim to help security pros combat the latest threats

Microsoft is launching AI agents integrated with its Security Copilot program to enhance organizational security against modern threats.
fromInfoQ
2 weeks ago

Designing for Defense: Architecting APIs with Zero Trust Principles

API security is crucial and requires Zero Trust principles to defend against modern threats.
fromSecuritymagazine
2 weeks ago

Why SASE Should Be As Flexible as the Organization

SASE adoption is rapidly increasing, with expectations to double in value by 2029, driven by the shift to hybrid work and cloud migration.
fromBleepingComputer
3 weeks ago

Overcoming Technical Barriers in Desktop and Application Virtualization

Virtualized environments are prime targets for cyberattacks due to their centralized nature and the potential vulnerabilities inherent in remote access protocols. Common Security Risks in Virtualization include credential-based attacks and exposure of RDP ports.
Remote teams
fromComputerworld
3 weeks ago

Google finally gets strict about web server certificates

Hollebeek argued that this is the right move, given that "many of these applications need no communication outside of the company network and will therefore be more securely protected on an internal PKI, where the organization can configure certificates as they see fit."
Privacy technologies
fromThe Hacker News
1 month ago

A New Maturity Model for Browser Security: Closing the Last-Mile Risk

Despite a robust investment in security measures like Zero Trust and endpoint protection, enterprises are significantly neglecting browser security, the critical layer where much of modern work occurs.
Privacy technologies
#ai-security
Artificial intelligence
fromIT Pro
2 months ago

Microsoft ramps up zero trust capabilities amid agentic AI push

AI agents must be treated as employees regarding security, requiring secure identification and not being trusted by default.
Artificial intelligence
fromIT Pro
2 months ago

Microsoft ramps up zero trust capabilities amid agentic AI push

AI agents must be treated as employees regarding security, requiring secure identification and not being trusted by default.
Marketing tech
fromTechzine Global
2 months ago

Zscaler acquires Red Canary for AI-driven security operations

Zscaler aims to enhance AI-driven security operations through the acquisition of Red Canary, enhancing threat detection capabilities.
fromDevOps.com
2 months ago

Why CI/CD Pipelines Break Zero-Trust: A Hidden Risk in Enterprise Automation - DevOps.com

Zero-trust principles are crucial in modern cybersecurity yet CI/CD pipelines often ignore them by assuming automation is inherently trustworthy, creating security vulnerabilities.
DevOps
#security
fromNextgov.com
3 months ago

Mounting cyber defense in the face of unexpected staff reductions

Federal cybersecurity is adjusting to workforce and budget cuts, challenging agencies to enhance strategies while maintaining resilience.
fromForbes
3 months ago

Enhancing Connectivity: The Cafe-Like Branch Model

Although caffeine and connectivity are easily available from public places, it's a real Sophie's Choice for IT and security leaders: Allow users direct access to the internet with no security controls, or route traffic to a remote data center using a VPN.
Remote teams
fromITProUK
3 months ago

Zero trust gains momentum amid growing network visibility challenges

Organizations face significant visibility challenges negatively impacting threat detection, promoting the adoption of zero trust strategies and tools.
fromHackernoon
4 months ago

IDT Corporation Partners With AccuKnox For Zero Trust Runtime IoT/Edge Security | HackerNoon

IDT Corporation partners with AccuKnox to implement runtime security CNAPP for improved IoT security amidst increasing AI-related vulnerabilities.
fromITPro
4 months ago

Microsoft launches new security AI agents to help overworked cyber professionals

"This is just the beginning; our security AI research is pushing the boundaries of innovation, and we are eager to continuously bring even greater value to our customers at the speed of AI."
Privacy professionals
Privacy professionals
fromSecuritymagazine
4 months ago

Phishing campaign leverages Microsoft 365 infrastructure for attacks

Microsoft 365 is being targeted by phishing campaigns exploiting domain misconfigurations and account takeovers.
Organizations are urged to adopt advanced security measures and zero-trust principles.
#cloud-security
Information security
fromInfoQ
5 months ago

A Zero Trust Future for Applications: Practical Implementation and Pitfalls

Zero Trust focuses on creating a controlled trust environment in networks, enhancing security and communication integrity.
Information security
fromInfoQ
5 months ago

A Zero Trust Future for Applications: Practical Implementation and Pitfalls

Zero Trust focuses on creating a controlled trust environment in networks, enhancing security and communication integrity.
Information security
fromDevOps.com
5 months ago

Teleport Unifies Infrastructure and Application Workload Security - DevOps.com

Teleport introduces a platform for secure IT infrastructure management using short-lived certificates, enhancing zero-trust policies and reducing reliance on static credentials.
#security-practices
fromAmazic
7 months ago
Information security

How Zero Trust redefines traditional authentication and authorization practices

fromAmazic
8 months ago
Information security

How Zero Trust redefines traditional authentication and authorization practices - Amazic

fromAmazic
7 months ago
Information security

How Zero Trust redefines traditional authentication and authorization practices

fromAmazic
8 months ago
Information security

How Zero Trust redefines traditional authentication and authorization practices - Amazic

fromComputerWeekly.com
7 months ago

CISOs: Don't rely solely on technical defences in 2025 | Computer Weekly

In 2024, one of the more subtle yet critical challenges that emerged was the rise of malinformation - deliberate misinformation aimed at manipulating and destabilising. Battling misinformation and reputational threats is becoming a top-line issue for all. By 2028, organisations will spend over $500 billion annually addressing malinformation, with impacts felt across marketing and cyber security budgets alike.
Information security
fromTheregister
7 months ago

Citrix has early gifts for security-conscious customers

German outfit deviceTRUST's approach to security starts with its well-founded belief that cyber crims try to steal valid authentication credentials. Their software assesses location and the presence of USB devices to determine the context of device usage. If a user's machine or behavior is outside expected contexts, the software can limit or deny access. This highlights a comprehensive approach to ensuring that even two-factor authentication is not the sole indicator of trust.
Information security
fromComputerWeekly.com
8 months ago

In the cloud, effective IAM should align to zero-trust principles | Computer Weekly

In today's digital landscape, the traditional security perimeter has dissolved, making identity the new frontline of defence. Effective Identity and Access Management practices are essential for IT departments to safeguard against cyber-attacks.
Information security
fromInfoQ
8 months ago

Cloudflare Introduces Short-Lived SSH Access, Eliminating the Need for SSH Credentials

Cloudflare's Access for Infrastructure SSH enhances security by replacing traditional SSH keys with short-lived, ephemeral certificates.
Information security
fromSecuritymagazine
9 months ago

99% of CISOs report fear over losing positions due to a data breach

CISOs overwhelmingly fear job loss over breaches and find security measures inadequate against evolving threats.
Passwordless authentication adoption is low due to various organizational challenges, despite its promise for stronger security.
The overwhelming majority of CISOs acknowledge the underperformance of Zero Trust Network Access in practice.
[ Load more ]