#zero-trust

[ follow ]
#cybersecurity
Information security
fromInfoQ
3 months ago

A Zero Trust Future for Applications: Practical Implementation and Pitfalls

Zero Trust focuses on creating a controlled trust environment in networks, enhancing security and communication integrity.
Marketing tech
fromTechzine Global
2 weeks ago

Zscaler acquires Red Canary for AI-driven security operations

Zscaler aims to enhance AI-driven security operations through the acquisition of Red Canary, enhancing threat detection capabilities.
Artificial intelligence
fromIT Pro
3 weeks ago

Microsoft ramps up zero trust capabilities amid agentic AI push

AI agents must be treated as employees regarding security, requiring secure identification and not being trusted by default.
Information security
fromInfoQ
3 months ago

A Zero Trust Future for Applications: Practical Implementation and Pitfalls

Zero Trust focuses on creating a controlled trust environment in networks, enhancing security and communication integrity.
Marketing tech
fromTechzine Global
2 weeks ago

Zscaler acquires Red Canary for AI-driven security operations

Zscaler aims to enhance AI-driven security operations through the acquisition of Red Canary, enhancing threat detection capabilities.
Artificial intelligence
fromIT Pro
3 weeks ago

Microsoft ramps up zero trust capabilities amid agentic AI push

AI agents must be treated as employees regarding security, requiring secure identification and not being trusted by default.
#ai-security
Privacy professionals
fromITPro
2 months ago

Microsoft launches new security AI agents to help overworked cyber professionals

Microsoft is enhancing its Security Copilot with new AI agents to support IT teams facing rising security threats.
Privacy professionals
fromITPro
2 months ago

Microsoft launches new security AI agents to help overworked cyber professionals

Microsoft is enhancing its Security Copilot with new AI agents to support IT teams facing rising security threats.
#security
fromInfoQ
7 months ago
Information security

Cloudflare Introduces Short-Lived SSH Access, Eliminating the Need for SSH Credentials

fromInfoQ
7 months ago
Information security

Cloudflare Introduces Short-Lived SSH Access, Eliminating the Need for SSH Credentials

Privacy professionals
fromNextgov.com
1 month ago

Mounting cyber defense in the face of unexpected staff reductions

Federal cybersecurity is adjusting to workforce and budget cuts, challenging agencies to enhance strategies while maintaining resilience.
Information security
fromITProUK
2 months ago

Zero trust gains momentum amid growing network visibility challenges

Organizations face significant visibility challenges negatively impacting threat detection, promoting the adoption of zero trust strategies and tools.
#cloud-security
Tech industry
fromHackernoon
2 months ago

IDT Corporation Partners With AccuKnox For Zero Trust Runtime IoT/Edge Security | HackerNoon

IDT Corporation partners with AccuKnox to implement runtime security CNAPP for improved IoT security amidst increasing AI-related vulnerabilities.
Tech industry
fromHackernoon
2 months ago

IDT Corporation Partners With AccuKnox For Zero Trust Runtime IoT/Edge Security | HackerNoon

IDT Corporation partners with AccuKnox to implement runtime security CNAPP for improved IoT security amidst increasing AI-related vulnerabilities.
Information security
fromDevOps.com
3 months ago

Teleport Unifies Infrastructure and Application Workload Security - DevOps.com

Teleport introduces a platform for secure IT infrastructure management using short-lived certificates, enhancing zero-trust policies and reducing reliance on static credentials.
#security-practices
fromAmazic
6 months ago
Information security

How Zero Trust redefines traditional authentication and authorization practices

fromAmazic
6 months ago
Information security

How Zero Trust redefines traditional authentication and authorization practices - Amazic

fromAmazic
6 months ago
Information security

How Zero Trust redefines traditional authentication and authorization practices

fromAmazic
6 months ago
Information security

How Zero Trust redefines traditional authentication and authorization practices - Amazic

[ Load more ]