Lenovo is helping make zero trust a more achievable reality by providing deep visibility and protection beyond the operating system and down to the component level with its new solution, ThinkShield Firmware Assurance. According to Gartner’s predictions, only 10% of large enterprises will have a mature and measurable zero trust program by 2026. Lenovo explained … continue reading
Zero trust is broken. Not because it’s a bad idea, but because most organizations are applying it wrong. If your security still depends on humans to approve access requests, verify identities, and respond to threats, you’re already behind. Zero trust’s core principle—trust no one, verify everything—breaks down when manual processes are too slow, error-prone, and … continue reading
Cybersecurity company Trend Micro this week released updates to its Trend Vision One solution designed to meet the mass adoption of new AI tools by managing the risks associated with that adoption and securing how organizations use AI. In the company announcement, co-founder and CEO Eva Chen said, “Great advancements in technology always come with … continue reading
BackBox has introduced Zero Trust Network Operations (ZTNO). This capability is designed as a best practice framework consisting of six actionable pillars aimed at integrating cybersecurity considerations directly into the network layer for NetOps teams. To grow the adoption of ZTNO, BackBox has upgraded its Network Automation Platform, incorporating enhancements to the Privileged Access Manager, … continue reading
Buoyant, the company behind Linkerd, has introduced Linkerd Enterprise, a commercial distribution of Linkerd tailored for enterprise users. It enhances the open-source Linkerd with features specific to enterprise needs, such as zero trust and FIPS 140-2 compliance, a sophisticated cost-aware load balancer, automation for lifecycle management, and additional functionalities to support enterprise adoption. “Over the … continue reading
Cloudflare One for AI was released as a collection of features that help teams build with the latest AI services while maintaining a zero-trust security posture. “Cloudflare One’s goal is to allow you to safely use the tools you need, wherever they live, without compromising performance. These features will feel familiar to any existing use … continue reading
Dell Technologies today announced updates that have been made to its storage portfolio in order to increase cyber resiliency, energy efficiency, and automation. These updates are intended to assist users along their multicloud journeys. With this update, PowerStore, Dell’s all-flash data storage array, is increasing its security to help organizations adopt a Zero Trust model. … continue reading
It’s no secret that businesses and organizations are embracing cloud services, containers, and other innovations to boost business productivity, scale more efficiently, and better manage infrastructure costs. However, transitioning legacy environments to the cloud introduces new challenges around securing dynamic and ephemeral cloud infrastructure. How can organizations unlock the full potential of the cloud without … continue reading
Dell announced new services for Microsoft products that focus on zero trust, including Identity and Endpoint Protection with Microsoft Zero Trust. The new capability aims to help companies achieve zero trust alignment by providing expert guidance, implementation services, adoption and change management strategies. It provides assessments of Active Directory and Azure Active Directory and offers … continue reading
The number of organizations that have some sort of Zero Trust initiative in place has more than doubled in the last year. This finding comes from the security company, Okta, which has announced the results of its fourth annual State of Zero Trust Security Report. The survey looked at 700 security leaders and revealed that … continue reading
The newly released Citrix Secure Private Access is a cloud-delivered, zero-trust network access offering that allows companies to provide employees access to apps and data that they need, from a variety of device types. “The IT pendulum has been swinging toward flexible work models for years, and the pandemic has accelerated the velocity,” said John … continue reading
The potential for cyberattacks has placed many organizations beyond Ukraine on high alert for any threats, and has left them wondering what they can do to bolster their security posture. “Unlike traditional warfare, which generally only has impacts in and around a specific conflict zone, cyberattacks can have far-reaching impacts beyond the initial target that … continue reading