248 results for 'zero trust'
Tech 101
Interview: John Kindervag, Creator of the Zero Trust Revolution
Fifteen years ago, businesses automatically trusted everything and everyone on the corporate network and trusted nothing on the outside. John Kindervag dared to question this traditional trust model and developed the Zero Trust framework, built on the principle of “never trust, always verify.” The concept quickly entered the mainstream and transformed how many think about […]
Tech 101
Why Zero Trust Needs MFA to Succeed: Expert Analysis
Zero Trust is the security approach that says that every time someone tries to do something on a computer, they need to prove who they really are. Multi-factor authentication (MFA) helps provide this proof by asking for different ways to verify the user’s identity, such as a password, fingerprint, or a code sent to the […]
Tech 101
Why Your Zero Trust Frameworks Aren't Working (Yet)
Cybersecurity breaches continue to plague businesses, casting doubt on the effectiveness of even one of the most lauded security models — the Zero Trust approach. As of 2023, a lot of businesses embraced the zero trust architecture, with Okta reporting a 61% adoption rate. The Zero Trust approach is often summarized as “verify everything, trust […]
Tech 101
The Lessons of Seagulls and Mushrooms: Tech Leadership Advice from Dr. Zero Trust
You know when leadership advice feels more like a pat on the back than a reality check? Meet Dr. Chase Cunningham, aka Dr. Zero Trust, who has recently published an unapologetic takedown of the toxic tactics and colossal errors have torpedoed careers and companies. The distinguished cybersecurity leader and Retired Navy Chief exposed the darker […]
Tech 101
Can Zero Trust Live Up To Its Promise? Unpicking The Latest NSA Guidance
Zero trust (ZT) has been hailed as the paradigm shift that could finally turn the tide against rising cybercrime. But despite growing industry consensus and a presidential order mandating all US agencies adopt it this year, many organizations seem stuck. Gartner predicts that just 10% of large enterprises will have a mature zero trust program […]
Tech 101
The Biggest Threat to Zero Trust Architecture? Silos.
As companies strive to secure newly remote and hybrid work environments, zero trust architecture (ZTA) has surged in popularity. ZTA refers to the practice of authenticating, authorizing and continuously validating users and their devices before giving them access to applications and data. This approach allows employees to work safely across different locations, devices and networks, […]
Tech 101
A Zero Trust Model is Better Than a VPN. Here's Why.
With up to 40% of Gen Z employees planning to take “workcations”—fulfilling one’s workplace responsibilities remotely from somewhere other than home—in 2022, companies are working to ensure they can keep their employees’ data secure wherever they travel. Employers understand it is essential, for both productivity and security, to provide secure access to networks while employees […]
Zero Trust
What Does Zero Trust Mean? Zero Trust (ZT) is a data-centric cybersecurity strategy for enterprise computing that assumes no end-user, computing device, web service, or network connection can be trusted — even when an access request originates from within the organization’s own network perimeter. The Zero Trust model has evolved to take into account distributed […]
Tech 101
Zero Trust Policy: How Software Intelligence Platforms Can Assist
Before the advent of AI-based technology, many IT companies used traditional approaches to protect users' data, intellectual properties, and other valuable resources. Apart from the fact that these traditional means are no longer sufficient, users and devices are ultimately in need of fast and secure access to data that this obsolete model can’t adequately provide. […]
Tech 101
Top 13 Cybersecurity Trends 2025: From GenAI to Zero-Trust
As technology advances, so do the techniques that cybercriminals use to exploit it. In 2025, cybersecurity will be more critical than ever as companies, governments, and individuals face new challenges in protecting their data and systems from the latest cybersecurity threats. From artificial intelligence (AI) to cloud security, organizations are investing heavily in ways to […]
Latest Features
Popular Categories