Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero Trust

Applying Zero Trust to Security Service Edge (SSE)

The current situation with legacy on-premises security defenses trying to support a hybrid work environment and zero trust principles is challenging for companies. Complications can include poor user experience, complexity of disjointed solutions, high cost of operations, and increased security risks with potential data exposure. Simple allow and deny controls lack an understanding of transactional risk to adapt policy controls and provide real-time coaching to users.

AI, Platforms, Zero Trust, and Other Topics That Dominated RSA Conference 2024

Every year there’s quite a bit happening at the RSA Conference and no matter how hard you try, it can be difficult to take it all in. Between a sprawling showfloor with hundreds of vendors vying for attention, speaking sessions with experts from across the industry, private meetings with customers and prospects, plus social events in the evening, it’s understandable that you can come away with a bit of sensory overload.

Trust vs Control - Is Zero Trust Inevitable?

Welcome back to Razorwire, the podcast slicing through the tangled world of cybersecurity! I'm your host, Jim and in this episode we’re talking about the crucial balance between trusting your workforce and exerting control over your security ecosystem. Joining me are Iain Pye, sharing his insights into privacy roles, and David Higgins from CyberArk, who will discuss the challenges and strategies of effective cybersecurity. Whether you're managing remote teams or integrating third party services, this episode is packed with expert analysis and actionable advice.

Securing the Factory of the Future: How ZTNA and SSE Empower Manufacturing

The manufacturing landscape is undergoing a digital revolution, driven significantly by Industrial IoT (IIoT), cloud adoption, and remote access needs. These advancements enable manufacturing companies to unlock efficiency gains, optimize operations, and enhance collaboration, but they also introduce a raft of new cybersecurity challenges. Legacy equipment and complex network setups have always made it difficult to secure manufacturing environments.

Random but Memorable - Episode 12.7: Zero Trust Fall Out with Dr. Chase Cunningham & Elliot Volkman

Think you know what zero trust is? Think again! This week, we welcome Dr Chase Cunningham & Elliot Volkman to the show to define what the zero trust security model looks like and debunk common misconceptions around it. Tune in, as we dive into how you can adopt zero trust in your organization, and deploy it successfully.

Why We Should Have Zero Trust in a Hybrid Public Sector Workforce

Those working in the UK public sector have seen significant upheaval over the last decade thanks to a combination of the long-term efforts to relocate civil servants outside London and, in recent years, the swift adoption of hybrid work practices necessitated during the pandemic. As a result, networks have expanded, the number of devices and endpoints to protect has grown considerably and potential vulnerabilities for attackers to target have increased.

9 Benefits of Zero Trust Architecture

Your organization’s data and applications are scattered across multiple cloud platforms and on-premise systems. How do you guarantee security in this sprawling digital landscape? Cloud sprawl is a reality — 76% of organizations grapple with this challenge when they turn to multi-cloud strategies. The rapid adoption also creates complexity and cracks in traditional perimeter-based security. Your attack surface multiplies with users, devices, and data scattered across environments.

The Importance of Identity Security in Zero Trust Endpoint Defense

Identity security and Zero Trust have emerged as critical components in the defense against quickly evolving cyberthreats. Together, the solution and the approach support a default stance of “never trust, always verify,” with every risky action requiring authentication, authorization and audit.

Ask Sage's Nicolas Chaillan on moving the DOD to zero trust and deploying Kubernetes in space

In this week’s episode of The Future of Security Operations podcast, I'm joined by Nicolas Chaillan. Nicolas is a security leader who has held several high-profile roles in US federal agencies including Chief Software Officer for the US Air Force and Space Force, Special Advisor for Cloud Security and DevSecOps at the Department of Defense (DOD), and Special Advisor for Cybersecurity and Chief Architect for Cyber.gov at the Department of Homeland Security.

Zero Trust requires unified data

It’s vital to have a common understanding and shared context for complex technical topics. The previously adopted perimeter model of security has become outdated and inadequate. Zero Trust (ZT) is the current security model being designed and deployed across the US federal government. It’s important to point out that ZT is not a security solution itself. Instead, it’s a security methodology and framework that assumes threats exist both inside and outside of an environment.