ColorTokens purchased PureID, expanding its zero trust framework with identity-based segmentation for cloud and hybrid environments. The acquisition focuses on securing cloud applications, microservices and APIs through advanced identity-based authentication.
Federal Chief Information Officer Clare Martorana told the Billington CyberSecurity Summit on Wednesday that the 24 CFO Act Agencies are on track to meet the Sept. 30 deadline given in the federal zero trust strategy released in 2022, which includes key milestones due at the end of the fiscal year.
Remote and hybrid work environments are here to stay - but so are the headaches caused by legacy VPN, which can lead to security vulnerabilities, rising costs and poor user experience. By adopting zero trust principles, enterprises can move past these risks, reduce costs and improve productivity.
Discover how you can successfully implement a zero-trust strategy with Netskope Zero Trust Network Access (ZTNA) and Illumio Zero Trust Segmentation (ZTS) in this short white paper.
Topics include:
Protecting north-south user-to-application communications with ZTNA
Protecting east-west...
Illumio's Andrew Rubin explains how AI enhances zero trust security by improving labeling accuracy, which is essential for effective segmentation. Rubin discusses AI's potential to streamline security processes and covers key partnerships with firms such as Microsoft, Netskope and Wiz.
An M&A due diligence process must include a comprehensive cybersecurity risk assessment, including all assets, threats, vulnerabilities and control measures, said Bradley Schaufenbuel, vice president and CISO at payroll and HR solution company Paychex.
The Biden administration is calling on government agencies and departments to file fiscal year 2026 budget proposals that focus on defending critical infrastructure, dismantling threat actors and investing in resilient federal systems, according to a new memorandum issued this week.
Implementing a zero trust security approach is critical to avoid the types of major IT disruptions and massive data compromises seen in recent cyberattacks that affected the healthcare, public health and government sectors, said Clinton McCarty, CISO at National Government Services.
ThreatLocker CEO Danny Jenkins explains how Series D funding is driving the company's zero trust cybersecurity model forward. He discusses the company's focus on improving endpoint security, the introduction of an MDR service, and plans for global data center expansion to better serve customers.
At the Gartner Security and Risk Management Summit, Thomas Lintemuth, vice president analyst at Gartner, discussed how network security tooling has evolved, blending technologies such as firewall, SSE, NDR and SASE. He covered VPNs, microsegmentation and the deployment of policy enforcement points.
IT and security teams are contending with the rapid expansion of cloud data. Amid a 73% surge in 18 months, organizations seek economical, secure, and scalable cloud data management solutions.
Watch our session, where we will discuss:
Achieving cloud economics while preserving Zero Trust principles;
Managing...
Poornima DeBolle, co-founder and chief product officer, Menlo Security, discusses the features of a secure enterprise browser, highlighting its tailored functionality for enterprises and how it differs from consumer browsers. She explained why enterprises require a browser that prioritizes security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.