In the latest weekly update, three editors at Information Security Media Group discuss important cybersecurity issues, including the latest ransomware trends, plus an update on NIST's "zero trust" initiative.
NIST has selected 18 technology companies to demonstrate "zero trust" security architectures as it prepares to draft guidance for use of the model by federal agencies, which the private sector can also follow.
In the latest weekly update, a panel of Information Security Media Group editors discusses the repercussions of the Kaseya ransomware incident, the immediate response of the cybersecurity community and key risk management takeaways.
As organizations prepare a plan for migrating to the Secure Access Service Edge, or SASE, model, they need to carefully assess the need for reorganization of the networking and security departments, says Nat Smith, senior director, security analyst at Gartner, which coined the SASE term.
Manish Dave, head of IT security and compliance at LafargeHolcim, a multinational company that manufactures building materials, describes two ways to implement the "zero trust" model: User-to-application and workload-to-workload segmentation.
Today's adversaries are approaching identity differently, and so defenders need to step up their game, too. SecurID's Murtaza Hafizji opens up on the future of secure identity, including the roles for passwordless authentication and zero trust security.
In an interview with Information Security Media Group, Hafizji...
We’ve gone from a remote workforce to “work from anywhere.” How does this create new security challenges regarding the broad and unrestricted accessing of cloud apps?
Download this executive guide from Sasi Murthy, Netskope's VP of Products and Solutions, for highlights on embracing zero trust data protection...
As a manufacturer, you need to protect your intellectual property and your supply-chain operations while safeguarding the privacy of your employees, partners and other third parties. This is no easy feat in the face of ransomware attacks that continue to make headlines across industries as they bring operations to a...
As more apps, data, and users are moving to the cloud, implementing a zero trust strategy is essential for any organization to accelerate digital transformation. Each organization may tailor their approach to zero trust based on their specific needs, but there are some core tenets that make zero trust effective and...
With the RSA Conference virtual this year, ISMG replaced its two live on-site studios with a suite of home studios and produced a diverse group of interviews on timely topics with thought leaders who will be solving cybersecurity's most urgent problems.
The "zero trust" model, in the context of mainframe security, might be different than you'd think.
Download this eBook and learn about:
Myths and realities of zero trust and the mainframe;
How the model maps to mainframe security's core tenets;
Life cycle for zero trust on the mainframe.
Click here to learn...
Election security improvements, the push for all software to ship with a "bill of materials" and the results of a long-running investigation into a lucrative digital advertising scam are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.