#zero-trust

[ follow ]
fromTechzine Global
22 hours ago

Veeam Software Appliance simplifies data protection

Veeam released a fully preconfigured, hardware-agnostic software appliance providing secure, prepatched backup with immutability, Zero Trust, automatic OS patching, and instant Azure recovery.
#zscaler
from24/7 Wall St.
1 day ago
Tech industry

Live: Will Zscaler Surge After Earnings?

Zscaler records ~20% revenue growth and consecutive EPS beats while preparing for an expected Q4 EPS decline amid AI-driven expansion and volatile post-earnings stock swings.
fromTechzine Global
3 months ago
Marketing tech

Zscaler acquires Red Canary for AI-driven security operations

Zscaler aims to enhance AI-driven security operations through the acquisition of Red Canary, enhancing threat detection capabilities.
Marketing tech
fromTechzine Global
3 months ago

Zscaler acquires Red Canary for AI-driven security operations

Zscaler aims to enhance AI-driven security operations through the acquisition of Red Canary, enhancing threat detection capabilities.
#cybersecurity
fromHackernoon
4 months ago
Privacy technologies

Beyond the Perimeter: Architecting Trust in the Cloud-Native Era by Mohit Kumar Singh | HackerNoon

fromHackernoon
4 months ago
Privacy technologies

Beyond the Perimeter: Architecting Trust in the Cloud-Native Era by Mohit Kumar Singh | HackerNoon

#ai-security
fromIT Pro
3 months ago
Artificial intelligence

Microsoft ramps up zero trust capabilities amid agentic AI push

AI agents must be treated as employees regarding security, requiring secure identification and not being trusted by default.
fromTechzine Global
4 months ago
Tech industry

The Techzine Perspective: RSAC 2025 is about AI security, integrated solutions, and the quantum threat

AI integration in security requires human oversight to ensure responsible systems.
Collaboration between tech vendors is critical for effective AI security.
Artificial intelligence
fromIT Pro
3 months ago

Microsoft ramps up zero trust capabilities amid agentic AI push

AI agents must be treated as employees regarding security, requiring secure identification and not being trusted by default.
Artificial intelligence
fromwww.infoworld.com
1 week ago

Securing AI workloads in Azure: A zero-trust architecture for MLOps

Zero-trust MLOps architecture uses Microsoft Entra ID, Azure Key Vault, Private Link and metadata-driven controls to authenticate, enforce least privilege, encrypt, isolate, and audit.
fromSecuritymagazine
2 weeks ago

Survey Reveals Top Challenges of Implementing Identity Security

A significant gap exists between the need for identity security and its implementation across organizations.
fromHackernoon
5 years ago

Forget Perimeters: Here's How Context Is Redefining Cloud Security | HackerNoon

The 'castle and moat' idea has gone from outdated to outright dangerous as applications and users have scattered across public clouds, SaaS platforms, and more.
Privacy professionals
fromTechzine Global
1 month ago

Zero Trust is the compass in the AI storm

Zscaler's architecture was designed from the outset with the priority of data privacy in mind, as Europe attaches importance to this issue.
Privacy technologies
fromInfoQ
1 month ago

Designing for Defense: Architecting APIs with Zero Trust Principles

API security is crucial and requires Zero Trust principles to defend against modern threats.
fromSecuritymagazine
1 month ago

Why SASE Should Be As Flexible as the Organization

SASE adoption is rapidly increasing, with expectations to double in value by 2029, driven by the shift to hybrid work and cloud migration.
fromBleepingComputer
1 month ago

Overcoming Technical Barriers in Desktop and Application Virtualization

Virtualized environments are prime targets for cyberattacks due to their centralized nature and the potential vulnerabilities inherent in remote access protocols. Common Security Risks in Virtualization include credential-based attacks and exposure of RDP ports.
Remote teams
fromComputerworld
1 month ago

Google finally gets strict about web server certificates

Hollebeek argued that this is the right move, given that "many of these applications need no communication outside of the company network and will therefore be more securely protected on an internal PKI, where the organization can configure certificates as they see fit."
Privacy technologies
fromThe Hacker News
2 months ago

A New Maturity Model for Browser Security: Closing the Last-Mile Risk

Despite a robust investment in security measures like Zero Trust and endpoint protection, enterprises are significantly neglecting browser security, the critical layer where much of modern work occurs.
Privacy technologies
fromDevOps.com
3 months ago

Why CI/CD Pipelines Break Zero-Trust: A Hidden Risk in Enterprise Automation - DevOps.com

Zero-trust principles are crucial in modern cybersecurity yet CI/CD pipelines often ignore them by assuming automation is inherently trustworthy, creating security vulnerabilities.
DevOps
fromTechzine Global
4 months ago

HPE gives Aruba Networking and GreenLake a security boost

HPE announced new security features focusing on Zero Trust access and expanded functionalities in HPE Aruba Networking and HPE GreenLake during the RSAC 2025 Conference.
Information security
fromNextgov.com
4 months ago

Mounting cyber defense in the face of unexpected staff reductions

Federal cybersecurity is adjusting to workforce and budget cuts, challenging agencies to enhance strategies while maintaining resilience.
fromForbes
4 months ago

Enhancing Connectivity: The Cafe-Like Branch Model

Although caffeine and connectivity are easily available from public places, it's a real Sophie's Choice for IT and security leaders: Allow users direct access to the internet with no security controls, or route traffic to a remote data center using a VPN.
Remote teams
[ Load more ]