The National Security Agency last month issued guidance on advancing zero trust programs through the network and environment pillar, with a key focus on microsegmentation. While the concept of microsegmentation is nothing new, why is the NSA behind it? And when will others follow?
Enterprises have deliberated on implementing zero trust for years, but vendors are overpromising and under-delivering on zero trust solutions. Gartner Vice President Analyst John Watts discusses the current adoption status and misunderstandings surrounding the framework.
Hybrid work is here to stay. This means that users, whether in the office or remote, need consistent, seamless protection when accessing corporate applications or the Internet.
Modernizing security to meet this challenge can seem complex and intimidating, particularly with today’s economic headwinds - but it...
According to a survey done by Forrester Consulting on IT decision makers in Australia and New Zealand, 46% of the organizations are interested in adopting the ZTNA strategy.
Zero Trust Network Access (ZTNA) is a foundational enabler in todays’ digital environment and this webinar delves deep into the strategies...
Skyhigh Security snagged longtime Cloudera and Splunk executive Vishal Rao as its next CEO to capture more opportunities in the growing security service edge market. Rao replaces Gee Rittenhouse, who left the company Feb. 29 to become AWS' vice president for security services.
Microsegmentation is a fundamental approach to achieving a mature zero-trust-guided strategy. But before tackling the complex job of microsegmenting infrastructure, IT teams must understand the business context and criticality of the data, said Robert LaMagna-Reiter, CISO at Hudl.
For the past 20 years, we have seen cybersecurity strategies primarily focus on protecting the network perimeter in a physically defined space. However since the time of covid till now the workforce perimeter has been redefined. Now the network perimeter is everywhere: it’s the user’s house, a coffee shop, a...
Yaniv Vardi shares how $100 million of strategic growth financing from Delta-v Capital will empower Claroty to secure critical infrastructure across verticals such as the public sector and transportation and geographies including the United States and Japan, setting the stage for an IPO.
The rapid rise of artificial intelligence technologies poses new risks. Enterprises using AI must regularly scan for prompt injection attacks, implement transparency in the supply chain and reinforce built-in software controls to serve their company's security needs, Microsoft said.
Cloud storage and compute are the new normal, but many businesses are stuck using on-premises networking, leading to limitations in capacity, high costs, and security vulnerabilities. This is especially challenging with the rise of hybrid work models.
Download the whitepaper to explore how Zero Trust Network Access...
In his first week in his new role as interim CEO of SSH Communications Security, Rami Raulas shares insights on the company’s strategic focus on zero trust, operational technology security, and quantum-safe cryptography to address evolving cybersecurity challenges.
Zscaler CEO Jay Chaudhry said Palo Alto Networks' strategy of offering free products to new platform customers will "unravel over time" as firewalls become shelfware. Legacy vendors find themselves "in a defensive position" as the role of firewalls shrinks and demand for zero trust security grows.
Microsegmentation is a fundamental concept in zero trust security, but CISOs should assess its feasibility before diving in. This is particularly true in a public cloud environment where there is no real network policy, said David Holmes, principal research analyst at Forrester.
SSH Communications Security CEO Teemu Tunkelo left the Finnish cybersecurity vendor abruptly Monday after low license sales in late 2023 slowed the company's growth. No reason was given for Tunkelo's departure, which stems from an agreement between the CEO and SSH and will take effect immediately.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.