Latest Articles
-
Interview
Why Your Zero Trust Frameworks Aren’t Working (Yet)
Cybersecurity breaches continue to plague businesses, casting doubt on the effectiveness of even one of the most lauded security models — the Zero Trust approach. As of 2023, a lot of businesses embraced the zero trust architecture, with Okta reporting a 61% adoption rate. The Zero Trust approach is often...
By: Franklin Okeke | Technology Journalist -
Interview
The Lessons of Seagulls and Mushrooms: Tech Leadership Advice from Dr. Zero Trust
You know when leadership advice feels more like a pat on the back than a reality check? Meet Dr. Chase Cunningham, aka Dr. Zero Trust, who has recently published an unapologetic takedown of the toxic tactics and colossal errors have torpedoed careers and companies. The distinguished cybersecurity leader and Retired...
By: Neil C. Hughes | Senior Technology Writer -
Gartner VP Analyst: 75% of U.S. Federal Agencies Will Fail Zero Trust Security
U.S. federal agencies, focusing on resources, finance, and national security, face unprecedented threats as nation-state cyber gangs escalate their attacks, let alone the constantly changing regulation landscape. While government budget spending on cybersecurity is on the rise, federal agencies face significant roadblocks ranging from legacy systems, slow digital transformations, continual...
By: Ray Fernandez | Senior Technology Journalist -
Cybersecurity
Can Zero Trust Live Up To Its Promise? Unpicking The Latest NSA Guidance
Zero trust (ZT) has been hailed as the paradigm shift that could finally turn the tide against rising cybercrime. But despite growing industry consensus and a presidential order mandating all US agencies adopt it this year, many organizations seem stuck. Gartner predicts that just 10% of large enterprises will have...
By: Mark De Wolf | Technology Journalist -
Cybersecurity
The Biggest Threat to Zero Trust Architecture? Silos.
As companies strive to secure newly remote and hybrid work environments, zero trust architecture (ZTA) has surged in popularity. ZTA refers to the practice of authenticating, authorizing and continuously validating users and their devices before giving them access to applications and data. This approach allows employees to work safely across...
By: Doug Kersten | Chief Information Security Officer -
Cybersecurity
A Zero Trust Model is Better Than a VPN. Here’s Why.
With up to 40% of Gen Z employees planning to take “workcations”—fulfilling one's workplace responsibilities remotely from somewhere other than home—in 2022, companies are working to ensure they can keep their employees’ data secure wherever they travel. Employers understand it is essential, for both productivity and security, to provide secure...
By: Almog Apirion | CEO -
Zero Trust
What Does Zero Trust Mean? Zero Trust (ZT) is a data-centric cybersecurity strategy for enterprise computing that assumes no end-user, computing device, web service, or network connection can be trusted -- even when an access request originates from within the organization’s own network perimeter. The Zero Trust model has evolved...
By: Margaret Rouse | Technology Specialist -
Artificial Intelligence
Zero Trust Policy: How Software Intelligence Platforms Can Assist
Before the advent of AI-based technology, many IT companies used traditional approaches to protect users' data, intellectual properties, and other valuable resources. Apart from the fact that these traditional means are no longer sufficient, users and devices are ultimately in need of fast and secure access to data that this...
By: Michael Usiagwu -
Is LayerZero ($ZRO) the Future of Blockchain Interoperability?
One challenge in the blockchain industry is figuring out how to move assets and data across different blockchain networks. The issue, known as interoperability, arises because various blockchain platforms use different protocols, consensus mechanisms, and programming languages. These differences create the equivalent of data silos, which limits the ability of...
By: Ruholamin Haqshanas | Crypto Journalist -
Will There Ever Be a Solution to Zero-Day Exploits? Expert Analysis
Zero-Day vulnerabilities have become a preferred vector of attack for cybercriminals. Pushed by the rapid acceleration and abundance of new software, updates, and apps being released, the software development sector is leaving wide security gaps and weak points across architectures. Google’s “A Year in Review of Zero-Days Exploited In-the-Wild”, released...
By: Ray Fernandez | Senior Technology Journalist