Latest Articles

  • Why Your Zero Trust Frameworks Aren't Working
    Interview

    Why Your Zero Trust Frameworks Aren’t Working (Yet)

    Cybersecurity breaches continue to plague businesses, casting doubt on the effectiveness of even one of the most lauded security models — the Zero Trust approach. As of 2023, a lot of businesses embraced the zero trust architecture, with Okta reporting a 61% adoption rate. The Zero Trust approach is often...

    By: Franklin Okeke | Technology Journalist

  • The Lessons of Seagulls and Mushrooms: Tech Leadership Advice from Dr. Zero Trust
    Interview

    The Lessons of Seagulls and Mushrooms: Tech Leadership Advice from Dr. Zero Trust

    You know when leadership advice feels more like a pat on the back than a reality check? Meet Dr. Chase Cunningham, aka Dr. Zero Trust, who has recently published an unapologetic takedown of the toxic tactics and colossal errors have torpedoed careers and companies. The distinguished cybersecurity leader and Retired...

    By: Neil C. Hughes | Senior Technology Writer

  • Cybersecurity Crisis: IMF Report Shows $12B Lost in US Financial Sector

    Gartner VP Analyst: 75% of U.S. Federal Agencies Will Fail Zero Trust Security

    U.S. federal agencies, focusing on resources, finance, and national security, face unprecedented threats as nation-state cyber gangs escalate their attacks, let alone the constantly changing regulation landscape. While government budget spending on cybersecurity is on the rise, federal agencies face significant roadblocks ranging from legacy systems, slow digital transformations, continual...

    By: Ray Fernandez | Senior Technology Journalist

  • Unpicking the New NSA Guidance for Zero Trust Architecture
    Cybersecurity

    Can Zero Trust Live Up To Its Promise? Unpicking The Latest NSA Guidance

    Zero trust (ZT) has been hailed as the paradigm shift that could finally turn the tide against rising cybercrime. But despite growing industry consensus and a presidential order mandating all US agencies adopt it this year, many organizations seem stuck. Gartner predicts that just 10% of large enterprises will have...

    By: Mark De Wolf | Technology Journalist

  • Cybersecurity

    The Biggest Threat to Zero Trust Architecture? Silos.

    As companies strive to secure newly remote and hybrid work environments, zero trust architecture (ZTA) has surged in popularity. ZTA refers to the practice of authenticating, authorizing and continuously validating users and their devices before giving them access to applications and data. This approach allows employees to work safely across...

    By: Doug Kersten | Chief Information Security Officer

  • Cybersecurity

    A Zero Trust Model is Better Than a VPN. Here’s Why.

    With up to 40% of Gen Z employees planning to take “workcations”—fulfilling one's workplace responsibilities remotely from somewhere other than home—in 2022, companies are working to ensure they can keep their employees’ data secure wherever they travel. Employers understand it is essential, for both productivity and security, to provide secure...

    By: Almog Apirion | CEO

  • Techopedia-img

    Zero Trust

    What Does Zero Trust Mean? Zero Trust (ZT) is a data-centric cybersecurity strategy for enterprise computing that assumes no end-user, computing device, web service, or network connection can be trusted -- even when an access request originates from within the organization’s own network perimeter. The Zero Trust model has evolved...

    By: Margaret Rouse | Technology Specialist

  • Artificial Intelligence

    Zero Trust Policy: How Software Intelligence Platforms Can Assist

    Before the advent of AI-based technology, many IT companies used traditional approaches to protect users' data, intellectual properties, and other valuable resources. Apart from the fact that these traditional means are no longer sufficient, users and devices are ultimately in need of fast and secure access to data that this...

  • Blockchains connected together via ZETA

    Is LayerZero ($ZRO) the Future of Blockchain Interoperability?

    One challenge in the blockchain industry is figuring out how to move assets and data across different blockchain networks. The issue, known as interoperability, arises because various blockchain platforms use different protocols, consensus mechanisms, and programming languages. These differences create the equivalent of data silos, which limits the ability of...

    By: Ruholamin Haqshanas | Crypto Journalist

  • Will There Ever Be a Solution to Zero-Day Exploits? Expert Analysis

    Will There Ever Be a Solution to Zero-Day Exploits? Expert Analysis

    Zero-Day vulnerabilities have become a preferred vector of attack for cybercriminals. Pushed by the rapid acceleration and abundance of new software, updates, and apps being released, the software development sector is leaving wide security gaps and weak points across architectures. Google’s “A Year in Review of Zero-Days Exploited In-the-Wild”, released...

    By: Ray Fernandez | Senior Technology Journalist