zero trust
Survey Sees Zero-Trust Transition Gaining Momentum
A recent Okta survey found the majority of organizations have implemented a zero-trust IT initiative, with another 35% planning to do so soon ...
Security Boulevard
Understanding The FTC Safeguards Rule
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, zero trust
The FTC Safeguards Rule requires financial institutions to guarantee protection of sensitive customer data The FTC Safeguards Rule mandates that “financial institutions” should create comprehensive information security frameworks that ensure the protection ...
The Urgency for Robust Utility Cybersecurity
Nik Hewitt | | advice, analysis, application protection, applications, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, zero trust
The need for improved utility cybersecurity has never been more critical The utility industry, encompassing everything from water treatment facilities to nuclear power stations, represents the backbone of modern civilization. As ...
Cheat Codes for accelerating your Zero Trust Journey with SSE and ZTNA
Making the transition to a Zero Trust Security Strategy can be similar to adopting a new ERP solution. Just about every aspect of how you operate your business must be considered and ...
Debunking the Myths of Microsegmentation
Nik Hewitt | | advice, application protection, application-centric, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, Platform News, service account protection, zero trust
What are the common myths behind microsegmentation, and is it actually as hard to achieve as some people say? The history of network segmentation is a complicated one with a plethora of ...
IAM Security for Zero Trust: Advanced Access Management and Control
Say goodbye to the network perimeter you know and love. Its days are numbered, and... The post IAM Security for Zero Trust: Advanced Access Management and Control appeared first on Entrust Blog ...
The Rise of Zero Trust
Zero Trust is an evolving security framework that operates on the principle of "never trust, always verify." It assumes no user or device should be inherently trusted, regardless of location or network ...
The Evolving Work of the CISO in 2024
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, TrueFort, zero trust
The challenges, responsibilities, and the modern cybersecurity battlefield for CISOs in 2024 I speak to many cybersecurity professionals, and if there’s one ongoing and pervasive concern they all highlight about the nature ...
The Essential Eight Cybersecurity Framework: Meeting and Surpassing Standards
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, next gen security, security, Security Research, TrueFort, zero trust
How can an organization meet and exceed the ASD Essential Eight cybersecurity framework standards? Cyber threats have become more sophisticated, frequent, and damaging, ensuring the cybersecurity of an organization’s digital assets is ...
Zero Trust Architecture: Beyond the Buzzword
Everyone’s heard of zero trust architecture, but why has it become best practice for enterprises around the globe? There’s no shortage of cybersecurity buzzwords. Among them, “zero trust” stands out not just ...