Tag: zero trust

Why SASE will benefit from faster consolidation of networking and security

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Seventy-five percent of enterprises are pursuing vendor consolidation, up from 29% just three years ago, with secure access service edge (SASE) experiencing significant upside growth as a result. SASE is also proving […]

Read More

A roadmap to zero-trust maturity: 6 key insights from Forrester

Once an enterprise decides to go all-in on zero trust, it usually starts strong, only to hit barriers no one saw coming. This makes a roadmap essential. Seeing its clients who are pursuing zero trust facing challenges in reaching the next level of maturity, Forrester invested a year of its zero trust team’s time in […]

Read More

Defining endpoint security in a zero-trust world

Attackers strike at businesses with identity theft as their top goal. CISOs and CIOs told VentureBeat they’ve seen spikes in identity-driven attacks in the first three months of 2023.  Getting identity right is core to a robust zero-trust framework. It takes endpoint resilience, improved sensing and telemetry data analysis techniques, and faster innovation at protecting […]

Read More

How security access service edge (SASE) can improve performance and security for hybrid workforces

Today’s business environments are more sprawled than ever — users are accessing networks from point A to point B and everywhere in between.  This has left many cybersecurity teams scrambling to cover all network points and users and ensure that gaps and silos don’t provide easy pathways for threat actors.  The broadened physical and virtual […]

Read More

How access management helps protect identities in the cloud

Things are rapidly growing more challenging on the security front in 2023. Many CISOs didn’t expect this much pressure to consolidate tech stacks, make budgets go further and do better at stopping identity-driven breach attempts. CISOs tell VentureBeat that access management (AM), identity and access management (IAM) and privileged access management (PAM) are under attack […]

Read More

A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company

Manufacturers are the most popular corporate targets for ransomware attacks and identity and data theft. With customer orders and deliveries hanging in the balance, they can only afford to have their product lines down for a short time. So attackers know that if they can disrupt manufacturing operations, they can force a high ransom payout.  […]

Read More

Access management must get stronger in a zero-trust world

Access management (AM) done right is the fuel for successful digital transformation. Identities and AM are core to earning customers’ trust — a must for digital-first initiatives to get a strong start and deliver revenue. AM and identities must be granular, role-based and as just-in-time as possible. Enterprises achieving that today are seeing zero-trust security […]

Read More

Modernizing identity access management with zero trust

CISOs tell VentureBeat they’re taking an increasingly pragmatic approach to modernizing identity access management (IAM) — and this starts with reducing legacy app and endpoint sprawl. The goal is a more efficient, economical, lean tech stack that’s solid enough to scale and support their enterprise-wide zero-trust frameworks.  Identities are under siege because attackers, criminal gangs […]

Read More

Creating secure customer experiences with zero trust

Check out all the on-demand sessions from the Intelligent Security Summit here. Solving the problem of protecting personalized customer experiences at scale will grow a digital business faster than competitors, fueling confidence and trust. Getting the balance of security, safety, confidence and trust right is table stakes for deriving the greatest value from digital transformation […]

Read More

How to use zero trust and IAM to defend against cyberattacks in an economic downturn

Despite double-digit budget increases, CISOs and their teams are scrambling to contain increased internal breaches, embezzlement and fraud. Identities are the attack vector of choice during a recession, exacerbated by inflationary costs driving up the cost of living, making phishing emails’ false claims of easy money all the more alluring. As one CISO confided to […]

Read More

Cloud future overcast by security concerns 

Check out all the on-demand sessions from the Intelligent Security Summit here. Cloud services are crucial elements of many business processes. Cloud computing allows businesses to reduce costs, accelerate deployments, develop at scale, share files easily and collaborate efficiently without needing a centralized location. However, these same services are increasingly abused by malicious actors — […]

Read More

Zero trust, XDR prominent in Gartner’s Hype Cycle for Endpoint Security

Every enterprise is in an endpoint security arms race. Attackers adapt their tactics faster than the most advanced security teams can react. One of the most compelling insights from comparing successive editions of Gartner’s Hype Cycle for Endpoint Security is how more CISOs are adopting extended detection and response (XDR) and zero trust network access […]

Read More

Why privileged access management should be critical to your security strategy

Check out all the on-demand sessions from the Intelligent Security Summit here. Nowadays, having a solution that manages privileged access is essential to prevent increasingly advanced hacker attacks. However, to ensure secure protection without gaps, you must include privilege elimination in your cyber strategy.  In this article, we’ll talk about privileged access management (PAM), explain […]

Read More

5 key cybersecurity trends for 2023

Check out all the on-demand sessions from the Intelligent Security Summit here. What’s on the horizon for cybersecurity in 2023? The landscape includes an acceleration of familiar and emerging trends, which means businesses should be ready to face an ever-changing environment where risk is inherent. In today’s cyber climate, no fish is too small for […]

Read More

Google Cloud CISO Phil Venables: Zero trust ‘essential’ to protect the cloud

Cybersecurity is a tough game. With a bleak economic outlook for 2023, security teams are under increasing pressure to secure complex cloud environments against financially and politically motivated threat actors looking to capitalize on any small mistake.  However, despite economic pressures, Google Cloud CISO Phil Venables suggested in a recent Q&A that investing in new […]

Read More

Benchmarking your cybersecurity budget in 2023

Check out all the on-demand sessions from the Intelligent Security Summit here. Knowing which areas to focus on in a cybersecurity budget to drive the most significant business value is a must-have skill for CISOs. Deloitte recently found that cybersecurity is core to cloud-based digital transformation, accounting for nearly 50% of the initiatives’ success. As […]

Read More

5 steps to deal with the inevitable data breaches of 2023

Thirty-seven million T-Mobile customer records were compromised in a breach the U.S.-based wireless carrier discovered on January 19 of this year. Password management platform LastPass has seen multiple attacks leading to a breach of 25 million users’ identities. VCU uncovered a breach earlier this month where more than 4,000 organ donors and recipients had their data leaked for […]

Read More

Zero trust’s creator John Kindervag shares his insights with VentureBeat — Part II

In Part II of VentureBeat’s virtual interview, John Kindervag shares his insights into how pivotal his experiences working at Forrester were in the creation of zero trust. He also describes his experiences contributing to the President’s National Security Telecommunications Advisory Committee (NSTAC) Draft on Zero Trust and Trusted Identity Management.  And, he advises CISOs and […]

Read More

Zero trust’s creator John Kindervag shares his insights with VentureBeat — Part I

VentureBeat sat down (virtually) last week with zero trust creator John Kindervag. Here are his insights into how zero trust’s adoption is progressing across organizations and governments globally and what he sees as essential to its growth. Zero trust security is a framework that defines all devices, identities, systems and users as untrusted by default. […]

Read More

Zero trust’s creator John Kindervag shares his insights with VentureBeat — Part I

VentureBeat sat down (virtually) last week with zero trust creator John Kindervag. Here are his insights into how zero trust’s adoption is progressing across organizations and governments globally and what he sees as essential to its growth. Zero trust security is a framework that defines all devices, identities, systems and users as untrusted by default. […]

Read More

Cisco turns to risk-based authentication to make MFA and zero trust practical

Check out all the on-demand sessions from the Intelligent Security Summit here. Multi-factor Authentication (MFA) may be important for implementing zero trust to block unauthorized users from sensitive data, but it’s also extremely inconvenient. All too often, MFA forces trusted employees to jump through hoops with one-time passwords and passcodes before they can login to […]

Read More

Getting results from your zero-trust initiatives in 2023

CISOs today find their agendas dominated by the need to reduce the complexity and costs of securing multicloud infrastructure while consolidating tech stacks to save on costs and increase visibility. That makes zero trust a priority. Seventy-five percent of security leaders say their cybersecurity systems and tech stacks are too complex and costly to operate. […]

Read More

How APIs are shaping zero trust, and vice versa

Check out all the on-demand sessions from the Intelligent Security Summit here. Two things are true in the cybersecurity space. First: Zero trust has become one of the most talked about and effective frameworks for digital security. Second: the rampant use of APIs and the vulnerabilities they pose has made it harder than ever for […]

Read More