In the latest weekly update, ISMG editors discuss ways organizations commonly founder when implementing a zero trust strategy, what the latest version of India's digital data protection bill means for CISOs, and how a 2022 data breach confirmed by Twitter may be worse than initially thought.
Zscaler has notched large, multiyear, multipillar deals as the economic downturn prompts clients to seek replacements for expensive legacy point products, says CEO Jay Chaudhry. Clients are increasingly buying Zscaler's secure web gateway, private access and digital experience tools as one bundle.
The foundation of a landmark presidential executive order and now a standard embraced by governments and enterprises globally, zero trust has come far in the past two years. Zero trust creator John Kindervag offers a progress report and insight into the key trends he sees shaping the new year.
The U.S. Army has embarked on its zero trust journey for both its information and network operations. Army CIO Dr. Raj Iyer shares how the military and the private sector are partnering to secure cloud infrastructure and solidify threat intelligence capabilities to fight adversaries.
The primary challenge with zero trust is keeping it simple, operationally efficient and easy to understand, with predictably positive outcomes. This is achieved across various systems, not with different solutions, policies and technologies in different areas, and it should involve minimal friction.
Complexity is the enemy of security, and information technology grows ever more complex. Have we created a problem space in computing so complicated that we will be unable to safely operate in it for its intended purposes? Fred Cohen says that's unlikely. He discusses managing risk in the future.
As the world transitions into a more permanent hybrid workforce, the flexibility it brings results in both benefits and challenges for employers and workers. Whether your team is working in the office, remotely, or something in-between, you don’t need to compromise your security to gain more flexibility. Join Cisco...
Splunk and Zscaler have partnered to deliver a superior, Zero Trust approach to security. The tightly integrated, best-of-breed cloud security and security analytics platforms deliver a cloud experience for the modern, cloud-first enterprise.
No vendor can sell you an out-of-the-box zero trust architecture, because zero trust (ZT) is more than just products or infrastructure. It’s a philosophy, a mindset, a strategy and a framework.
A zero trust approach means treating any network as compromised and assuming that threats — both external and internal...
In Part 3 of a three-part video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, describe the operational and business benefits of creating an identity strategy.
In Part 2 of this video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, explain why organizations need to think about identities in the context of humans and nonhumans, their roles and their risks.
Google has long embraced zero trust architecture, and Google Workspace comes with zero trust built into it. Andy Wen of Google discusses the zero trust journey, where he sees enterprises struggle, and how Google Workspace customers can take advantage of the inherent zero trust elements.
In this interview with...
In Part 1 of a three part-video series, Andrew Abel, a cybersecurity and zero trust consultant and CyberEdBoard member, and Chase Cunningham, CSO at Ericom Software, share tips on how to create an identity strategy within the broader context of zero trust.