CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Zero Trust
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Zero Trust

Hands on virtual login screen showing generative AI and zero trust
Cyber SecurityInsights

Generative AI in the Age of Zero-Trust

November 29, 2023
As attacks evolve and become more sophisticated, the industry's response has been to adopt the zero-trust architecture. However, with the rise of zero-trust architecture, we've also seen an unexpected, unwelcome guest: complexity.
Read More
User working on laptop with digital lock showing zero trust
Cyber SecurityInsights

It’s a Process, Not a Product: A Proven Approach to Zero Trust

August 23, 2023
The true essence of Zero Trust lies in embracing a process-centric approach rather than relying solely on products. CISA has established a set of maturity pillars that guide organizations in their journey toward zero trust. Understanding these pillars is essential for CISOs and CPOs looking to build a robust security framework.
Read More
Lock on technology background showing zero trust
Cyber SecurityInsights

Zero Trust: Zero Value or a Trust Enabler?

June 6, 2023
Zero trust has firmly inserted itself into modern cybersecurity strategies but the perceived value of zero trust can vary widely, Organizations need to strike a balance between uninformed action and over-preparation when launching their zero trust strategy.
Read More
Shield Icon against data and network showing zero trust and attack surface
Cyber SecurityNews

Gartner: Slow Adoption and Expanding Attack Surface; Zero Trust Will Not Stop Over 50% Of Attacks by 2026

February 3, 2023
Zero trust will not stop over 50% of attacks by 2026 because only 10% of large firms will have mature programs, and hackers will expand the attack surface beyond zero trust coverage.
Read More
Man in online video conference meeting showing zero trust and decentralized workforce
Cyber SecurityInsights

Zero Trust, Sustaining in a Difficult Economy, and Acceleration of the Decentralized Workforce Will Shape 2023

January 20, 2023
The increase in cybersecurity compliance requirements is an opportunity for Zero Trust strategies to be further embraced. This makes the best sense for the growing decentralized workforces which is one of the biggest trends to continue into 2023.
Read More
Virtual lock over laptop showing zero trust and IAM
Cyber SecurityInsights

Why Authorization Is Rising as a Priority in IAM

January 3, 2023
Identity-first security which focuses on the integrity of the user identity as the core of an organization's security strategy is now a prerequisite for Zero Trust architecture, and is designed to ensure that the individual is authorized throughout the user's digital journey and granted the right level of access to the appropriate digital assets.
Read More
Man working on laptop with virtual lock showing zero trust for SaaS
Cyber SecurityInsights

How Zero Trust Secures Business-Critical SaaS Application Data

December 8, 2022
The time is now for business leaders to implement zero-trust protocols to address cloud misconfigurations beyond the identity layer and into the SaaS app ecosystem, as doing so has become critical for organizations to be able to maintain a good security posture. Zero Trust Data Access (ZTDA) does just that.
Read More
Man using laptop and smartphone with virtual globe showing zero trust and digital transformation
Cyber SecurityInsights

Role of Zero Trust in Asia’s Digital Transformation Journey

November 17, 2022
While the wheels of digital transformation were set in motion much earlier, the pandemic accelerated their speed. It significantly impacted how organisations approach their IT ecosystem and security. Today’s landscape, with no perimeter, requires a Zero Trust approach.
Read More
Businessman using mobile phone with virtual lock showing zero trust
Cyber SecurityInsights

Your Zero Trust Strategy Shouldn’t Have an Asterisk Behind It

November 10, 2022
Zero Trust has reached buzzword status in the security industry. But, unfortunately, many vendors that claim to provide Zero Trust solutions fall short of addressing all critical components.
Read More
Aerial view of factory showing government sector OT security require zero trust
Cyber SecurityInsights

The Steps To Securing Operational Technology in the Government Sector

October 17, 2022
Government agencies, from the municipal to the federal level, have the largest and most varied number of use cases that require a Zero Trust Architecture , because of the range of systems they operate and the weaknesses of OT security.
Read More
Load More

Latest

Australia Parliament House showing cybersecurity plan

Australia’s New Cybersecurity Plan: A$587 Million for Law Enforcement Funding, Small Business Assistance

Hands on virtual login screen showing generative AI and zero trust

Generative AI in the Age of Zero-Trust

Stethoscope on laptop showing cybersecurity regulations for New York healthcare facilities

New York State Healthcare Facilities Looking at New Cybersecurity Regulations, New Funding in 2024

Top view of hooded hacker working on laptop showing third party data breach impact Canada government employees

Third Party Data Breach of Contractors Exposed Personal Information of Canadian Government Employees Dating Back 25 Years

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations EU GDPR Facebook
    See all results