When employing a zero trust strategy at an enterprise, cybersecurity teams must consider instituting a least privilege policy — providing only strictly necessary access credentials to employees and revoking them when no longer needed.
The journey to hybrid cloud
Identity and Access Management follows a four-step process that will increase a business’ speed, agility and efficiency while providing the flexibility to support unique requirements every step along the way.
Massachusetts' residents lost over $97 million to cybercrimes in 2020, according to the FBI's 2020 Internet Crime Report. In an effort to curb such crimes, the state has created a cyber committee.
Security spoke to Bill Wright, Director of Federal Government Affairs at Splunk, for a deeper dive into strategies federal organizations can use to facilitate expedited zero trust adoption.
Zero trust has become the latest buzzword in the security industry. It’s helpful to analyze the model from the attacker’s perspective to identify assumptions or actions that could provide a foothold for cybercriminals.
Tim Danks, Huawei VP of Risk Management, discusses his thoughts on cybersecurity and the great need for global collaboration to build cyber risk management standards across the world.
Zero Trust and SASE have become top of mind for many organizations globally in the past year as business models changed overnight to accommodate a remote workforce, bringing an expanded attack surface.
The massive shift to remote work and a continually expanding attack surface has made the concept of trust-based security a naïve one at best, dangerous at worst. But the upshot is that everything we’ve seen and experienced in the past year has helped seed the need for a zero-trust based approach. Let’s look at some of the major trends and factors of the past year and how these risks can be mitigated using a zero trust approach.