Zero Trust

Entity category: technology

Business

NSA’s New Zero Trust Guidelines: A Blueprint for Security

The NSA has released new Zero Trust Implementation Guidelines (ZIGs) to provide a flexible, phased path for organizations to achieve…

Read More »
Business

US Data Breaches Soar to Record High, Yet Fewer Victims Impacted

U.S. data compromises reached a record high of 3,332 in 2025, but the number of affected individuals fell sharply due…

Read More »
AI & Tech

Microsoft Exec: How AI Will Transform Everything in 6 Years

A Microsoft executive forecasts that AI will evolve from an assistant to an autonomous agent within six months, fundamentally reshaping…

Read More »
Artificial Intelligence

RadiantOne Adds Composable Remediation and Unified Identity Observability

The RadiantOne Platform introduces AI-powered collaborative remediation and a unified observability layer, shifting identity management from reactive monitoring to proactive,…

Read More »
Business

A Step-by-Step Guide to Implementing Zero Trust

Zero trust security shifts from assuming internal network trust to continuously verifying every user, device, and application attempting to access…

Read More »
Business

Build an Unbreakable Supply Chain with This Tech

A resilient supply chain requires a holistic strategy integrating technology, risk management, and forward-thinking planning, treating it as a unified…

Read More »
Artificial Intelligence

Zero Trust for AI: Extending “Never Trust, Always Verify”

Businesses are rapidly adopting AI assistants to boost productivity, but this introduces new security vulnerabilities that traditional models cannot handle,…

Read More »
Artificial Intelligence

Tufin R25-2 Boosts Network & Cloud Security Automation

Tufin Orchestration Suite R25-2 enhances security by providing expanded visibility, comprehensive automation, and stronger controls across hybrid networks from a…

Read More »
AI & Tech

Your AI Agents Are Zero Trust’s Biggest Blind Spot

The autonomy of AI agents introduces security vulnerabilities in Zero Trust architectures by bypassing continuous verification requirements through inherited or…

Read More »
Artificial Intelligence

Innoventures Education Boosts Learning with HPE Aruba AI Platform

Innoventures Education has enhanced its digital learning infrastructure by implementing HPE Aruba Networking Central, an AI-driven platform that supports over…

Read More »
Artificial Intelligence

Forrester: AI-Powered Data Breach Coming in 2026

Forrester predicts a major data breach caused by autonomous AI systems will occur and become public next year, leading to…

Read More »
Artificial Intelligence

The Password Problem We Still Haven’t Solved

Identity-related breaches persist due to basic vulnerabilities like reused passwords and insufficient verification, allowing attackers prolonged network access. Passwords remain…

Read More »
Business

Zero Trust: Slash Cyber Risk and Insurance Claims

Businesses in Australia and Oceania are facing a sharp rise in sophisticated cyberattacks, and adopting a Zero Trust security architecture…

Read More »
Business

Master CISA’s Zero Trust with Modern Microsegmentation

CISA now identifies microsegmentation as a foundational element of Zero Trust architecture, shifting it from an advanced tactic to an…

Read More »
Artificial Intelligence

Inside Walmart’s AI Security: Startup Mentality, Enterprise Defense

Walmart addresses AI security risks like data exfiltration and API misuse through AI Security Posture Management (AI-SPM) for continuous monitoring…

Read More »
BigTech Companies

Microsoft Tests Windows 365 Cloud Disaster Recovery PCs

Microsoft introduced Windows 365 Reserve, a cloud-based disaster recovery solution that provides temporary virtual desktops for up to 10 days…

Read More »
AI & Tech

Break Through Desktop & App Virtualization Challenges

Remote and hybrid work trends have made desktop and application virtualization essential, offering flexibility and security but requiring IT teams…

Read More »
BigTech Companies

Microsoft SaaS Vulnerability Exposed Apps for 2 Years

A critical security flaw in Microsoft’s Entra ID, called nOAuth, has exposed thousands of enterprise applications for two years, allowing…

Read More »
Business

Why Hackers Target Events—And How CISOs Can Stop Them

Live events present unique cybersecurity challenges due to transient digital systems, unsecured devices, and concentrated sensitive data, creating ideal conditions…

Read More »
BigTech Companies

Microsoft Edge Adds Secure Business Password Management

Microsoft Edge has launched a secure password-sharing feature for businesses, allowing encrypted credential distribution to teams via Microsoft Edge for…

Read More »