Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Single Sign-On (SSO) Can Take Federal Agencies to the Next Level of User Authentication

It is no secret that agencies are facing multiple challenges when it comes to meeting mandates from the White House Executive Order on Improving the Nation’s Cybersecurity. The order calls for the adoption of numerous best practices, including the implementation of a zero trust architecture (ZTA).

OT:ICEFALL: Addressing Operational Technology Equipment Flaws with Zero-Trust Controls

A new report on Operational Technology (OT) equipment flaws from automated cybersecurity software company Forescout outlines the alarming state of OT security. The report titled OT:ICEFALL was crafted by researchers at the company’s Vedere lab. It breaks down 56 vulnerabilities affecting 26 devices from 10 vendors in OT.

How Zero Trust Strengthens Password Security

Password security is crucial to preventing cyberattacks. It is important to find a password manager that enables the zero-trust security model to mitigate the risks of data breaches from compromised user accounts. The U.S. government released a memorandum earlier this year, detailing the requirement for federal agencies to achieve zero trust by the end of Fiscal Year 2024 in an effort to strengthen their cyberdefenses.

Accelerate the Journey to Zero Trust with Forescout and Arista

Forescout and Arista have simplified granular enforcement by orchestrating workflows across device identity, logical group creation, group-based segmentation policy design and enforcement. This accelerates zero trust policy deployment while unifying network and security management.

Instant Zero-Trust Access to Remote IT Infrastructure

Tired of the latency, availability and reliability issues of VPNs and legacy remote desktop tools? Keeper Connection Manager (KCM) provides DevOps and IT teams with effortless access to RDP, SSH, database and Kubernetes endpoints through a web browser on any device. Watch this webinar to learn more about KCM and how you can grant access to privileged systems without exposing login credentials. During the webinar, Zane Bond, Sr. Director of Product Management, will cover.

How MSPs can overcome zero-trust barriers

Zero-trust cybersecurity strategies stimulate digital transformation of businesses. As this approach reduces threat risks appreciably, companies have more incentives to make changes to their systems or invest in new technologies. 59% of organizations take this view, according to the Watchguard Pulse Maturity of Zero-Trust in 2022 survey conducted with IT leaders from businesses across the world.

Six Steps to Achieve Zero Trust in Application Security

The continuing escalation in cyberattacks on large corporations, coupled with an acceleration of digital transformation, has forced organizations to reassess their security strategies and infrastructure. This escalation has driven growth in the adoption of zero-trust application security and compliance. The zero-trust approach means that no devices or software should be trusted by default, even if they have permissions and previous verification.

Zero trust for cloud-native workloads: Mitigating future Log4j incidents

In my previous blog, I introduced the brief history of zero trust, the core pillars of a zero-trust model, and how to build a zero-trust model for cloud-native workloads. In this blog, you will learn how Calico can help mitigate vulnerabilities such as the recent zero-day Log4j vulnerability with its zero-trust workload security approach.