Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloudflare acquires BastionZero to extend Zero Trust access to IT infrastructure

We’re excited to announce that BastionZero, a Zero Trust infrastructure access platform, has joined Cloudflare. This acquisition extends our Zero Trust Network Access (ZTNA) flows with native access management for infrastructure like servers, Kubernetes clusters, and databases.

Breaking Barriers: Demystifying Zero Trust with Chase Cunningham & Keeper Security

Zero trust is a powerful cybersecurity approach, but its implementation remains a challenge for many organizations. In this webinar, renowned expert Chase Cunningham demystifies the concept of zero trust and provides practical strategies to overcome the barriers to its adoption. Cunningham explores the core principles of zero trust, dispelling common misconceptions and highlighting its benefits in protecting against modern cyber threats. Drawing from real-world experiences, he'll guide you through the process of implementing robust zero-trust architectures tailored to your organization's needs.

Maximizing Security: A Complete Guide to IAM Zero Trust Principles

In a security landscape that no longer tolerates assumptions of trust, IAM Zero Trust offers a stringent approach to protect your network. Discover how to apply ‘never trust, always verify’ effectively in our comprehensive look at IAM Zero Trust principles.

How Cybersecurity Firms Leverage Technology to Stay Ahead

Cybersecurity companies are leading the way in protecting the digital landscape in an era where cyber-attacks are growing more complex. The dynamic character of cyberattacks encompasses ransomware, phishing, and increasingly intricate advanced persistent threats (APTs). Because of this, these companies have to use cutting-edge technology in order to keep one step ahead of the bad guys.

ZTNA vs VPN: Decoding the Best Remote Work Security Option

While virtual private networks (VPNs) have been the go-to solution for remote access for decades, the surge in remote work during the pandemic has highlighted the cracks in its armor. Granting unrestricted access to everything stored within a corporate network can quickly become a security nightmare, especially as remote workers continue to rely on an increasing number of devices and access points.

Teleport Workload Identity with SPIFFE: Achieving Zero Trust in Modern Infrastructure

Teleport Access Platform generates cryptographic identity for users, machines, devices, and resources, creating a single source of truth for what users and machines are accessing what in your modern infrastructure. Now, engineers will be able to generate identity specific to workloads and services, enabling your full modern infrastructure stack to operate with zero trust authentication.

Challenges of Adopting Zero Trust

The world has changed. With the move to hybrid working, the rapid adoption of cloud, increased use of mobile and IoT devices, and more, every organization’s attack surface has expanded and businesses are finding it harder than ever to protect their networks and digital assets. This will undoubtedly be the central theme for this year’s Cybersec Europe.
Featured Post

Why adopting a Zero Trust approach is not as straightforward as it might appear

The world has changed. With the move to hybrid working, the rapid adoption of cloud, increased use of mobile and IoT devices, and more, the attack surface of every organization has expanded and businesses are finding it harder than ever to protect their networks and digital assets. This will, no doubt, be the central theme for this year's Cybersec Europe, taking place on May 29th and 30th in Brussels. The event aims to arm visitors with the know-how and solutions to make their businesses cyber resilient and secure their digital assets. But it is not just about securing assets. Traditional boundaries have blurred between businesses, suppliers, customers, workers, and home-life.