Tag "Zero Trust"

Back to homepage
Hardware/Network

The VPN is dying, long live zero trust

The venerable VPN, which has for decades provided remote workers with a secure tunnel into the enterprise network, is facing extinction as enterprises migrate to a more agile, granular security

Industry Insights

Corporate cyber-security for the 2020s: is it time for your enterprise to begin exploring a zero trust model?

Wondering why you keep hearing about cyber-security breaches every other day and questioning whether your current protection measures are fit for purpose? You’re wise to do so. In 2020 Australia,

Software

Preventing insider threats, data loss and damage through zero trust

With the proliferation of mobile devices and BYOD, ubiquitous and always available internet connectivity and the widespread use of private, public and hybrid cloud solutions, eventually all organizations will be

Hardware/Network

Network complexity and lack of visibility contribute to misconfigurations and increased risk

Enterprises are slow to abandon manual processes, despite being short staffed, as the lack of automation, coupled with increasing network complexity risk and lack of visibility contribute to costly misconfigurations

Software

7 Signs It’s Time To Get Focused On Zero Trust

When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to

Hardware/Network

Businesses are ditching their VPNs

VPN attacks and related breaches are on the rise, forcing organisations to adopt a new method of securing their networks and cloud apps. Because of this, according to cloud security

Artificial Intelligence Software

10 Charts That Will Change Your Perspective Of AI In Security

Rapid advances in AI and machine learning are defining cybersecurity’s future daily. Identities are the new security perimeter and Zero Trust Security frameworks are capitalizing on AI’s insights to thwart breaches in

Software

Six steps for implementing zero trust access

Modern organizations are no longer governed by fixed perimeters. In fact, the perimeter-based security model is disintegrating in a world where users work on their own devices from anywhere, and

Software

PERSPECTIVE: How Cybersecurity Must Change Our Lives

More than 30 years ago, I warned a number of executives that “the criminals will destroy the Internet.”  “We have to work against this now,” I warned. A few people

Cloud

Five ways to manage authorization in the cloud

The public cloud is being rapidly incorporated by organizations, allowing them to store larger amounts of data and applications with higher uptime and reduced costs, while at the same time, introducing new