Zero-day attacks and unpatched vulnerabilities make a lot of headlines. But the results of our inaugural 2024 Data Loss Landscape report show that people are the root cause of most data loss incidents.
This Global Survey Report of 600 security practitioners, explores the current state of data loss protection (DLP)...
Remote and hybrid work environments are here to stay - but so are the headaches caused by legacy VPN, which can lead to security vulnerabilities, rising costs and poor user experience. By adopting zero trust principles, enterprises can move past these risks, reduce costs and improve productivity.
Discover how you can successfully implement a zero-trust strategy with Netskope Zero Trust Network Access (ZTNA) and Illumio Zero Trust Segmentation (ZTS) in this short white paper.
Topics include:
Protecting north-south user-to-application communications with ZTNA
Protecting east-west...
Illumio's Andrew Rubin explains how AI enhances zero trust security by improving labeling accuracy, which is essential for effective segmentation. Rubin discusses AI's potential to streamline security processes and covers key partnerships with firms such as Microsoft, Netskope and Wiz.
How close are you to achieving Zero Trust? If you’re a CISO or other security leader, recent and forthcoming government mandates mean you urgently need an answer to this question.
An M&A due diligence process must include a comprehensive cybersecurity risk assessment, including all assets, threats, vulnerabilities and control measures, said Bradley Schaufenbuel, vice president and CISO at payroll and HR solution company Paychex.
The Biden administration is calling on government agencies and departments to file fiscal year 2026 budget proposals that focus on defending critical infrastructure, dismantling threat actors and investing in resilient federal systems, according to a new memorandum issued this week.
In Forrester's 2023 Cybersecurity Threats report, AI applications like ChatGPT are identified as emerging threats. Gartner highlights five major risks associated with generative AI: fabricated information, deepfakes, data privacy, copyright issues, and cybersecurity.
Generative AI poses a significant cybersecurity...
Healthcare organizations secure more data overall, far more sensitive data, and see data growth rates outpacing the overall global average. Join this session to hear from the Head of Rubrik Zero Labs, Steve Stone sit down with Rick Bryant, Rubrik’s Healthcare CTO to discuss the Zero Labs Report findings, the...
Implementing a zero trust security approach is critical to avoid the types of major IT disruptions and massive data compromises seen in recent cyberattacks that affected the healthcare, public health and government sectors, said Clinton McCarty, CISO at National Government Services.
ThreatLocker CEO Danny Jenkins explains how Series D funding is driving the company's zero trust cybersecurity model forward. He discusses the company's focus on improving endpoint security, the introduction of an MDR service, and plans for global data center expansion to better serve customers.
At the Gartner Security and Risk Management Summit, Thomas Lintemuth, vice president analyst at Gartner, discussed how network security tooling has evolved, blending technologies such as firewall, SSE, NDR and SASE. He covered VPNs, microsegmentation and the deployment of policy enforcement points.
Organizations are moving from traditional perimeter-based security to identity-based security. This shift focuses on continuous identity verification rather than assuming internal users are automatically trusted, said Vivin Sathyan, senior technology evangelist, ManageEngine.
Cloudflare acquired BastionZero to provide its platform with enhanced zero trust controls for servers, Kubernetes clusters and databases. The purchase aims to secure remote access, improve compliance and simplify infrastructure management for hybrid IT environments.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.