Forrester recently published a report that shows over two-thirds of European security decision-makers have begun to develop a zero trust strategy, and public sector organizations are leading the way. Forrester's Tope Olufon shares the cultural and regulatory roadblocks to zero trust.
There is a need to mark security controls to the threats that are out in the market, says Durga Prasad Dube, who is the executive vice president with Reliance Industries. By continually evaluating controls, organizations can create greater efficiencies and increase resiliency, he says.
The shift to hybrid work and ubiquity of cloud has resulted in a rapid rise in SASE interest and adoption. Now, organizations are seeking a holistic approach that allows them to extend their security and networking infrastructure while significantly improving the user experience.
During this webinar you will learn...
In times of economic uncertainty, security teams are tasked to do more, but with fewer resources, making it more difficult to mitigate cyberthreats. The status quo of standard tools & methods make it overly complex and inefficient when it comes to the use of both money and human capital (of which there is a growing...
Zscaler has axed nearly 180 workers after more deliberation from new customers around large purchasing decisions led to reduced billings growth. The company revealed plans to cut its 5,900-person staff by roughly 3% - or about 177 positions - as it adapts to a more challenging business environment.
Hewlett Packard Enterprise will soon offer clients single-vendor SASE after agreeing to buy a security service edge startup founded by a Symantec security researcher. HPE will combine the cloud, web and data security technology acquired from Axis Security with its SD-WAN tool from Silver Peak.
In the latest weekly update, John Kindervag, creator of zero trust and senior vice president of cybersecurity strategy at ON2IT, joins ISMG editors to discuss the top zero trust storylines of the year, the impact of ChatGPT on the cybersecurity industry and how to tackle MFA bypass attacks.
In 2023 a survey in the Singapore market revealed that 88% of IT leaders in Singapore believe that Zero Trust is important to their organization's cybersecurity strategy.
In this new age of digital communication, bad actors are always looking for ways to exploit a business. Looking at this, the movement to cloud...
There’s no doubt that Highly Evasive Adaptive Threats (HEAT) attacks are adding fuel to the ransomware fire. According to ESG, 22% of organizations say ransomware readiness is their most important business priority, and 46% indicate it is one of their top 5 business priorities.
Download this report to learn:
Today’s evolving cyber-risk environment requires an ‘assume breach’ mindset.
Chief Information Security Officers (CISOs) know it. So do regulators, IT Security auditors, boards and cyber insurance providers, who are increasingly mandating adoption of Zero Trust cybersecurity principles.
Join CyberArk for...
Praveen Kumar, group CISO of Zee Entertainment Enterprises, says the market has failed to provide enough solutions to isolate the network when an attack happens. While a zero trust approach helps, there are not enough tools available in the market, he adds.
Juniper Networks has debuted security service edge capabilities that help clients consistently apply zero trust policies in the cloud regardless of the user or device. Juniper takes the policies customers already use within their network and converts them to cloud-delivered policies with one click.
Valuations are down, some companies have left the market altogether, and some even have announced deep rounds of layoffs. Yet, Alberto Yépez of Forgepoint Capital retains optimism for the cybersecurity marketplace in 2023 and says now is the ideal time to be ramping up investments in innovation.
In this episode of "Cybersecurity Unplugged," Chris "Tito" Sestito discusses technology to protect neural networks and artificial intelligence and machine-learning models, and John Kindervag explains how such technology fits into the zero trust framework.
The need to implement zero trust at scale is growing ever more critical. In this video interview with Information Security Media Group, subject matter experts Srinivas Tummalapenta of IBM and Justin Douglas of Palo Alto discuss the guiding principles of scaling zero trust.