CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Zero Trust
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Zero Trust

Businessman standing with an umbrella in the ocean showing cyber insurance and zero trust architecture
Cyber SecurityInsights

Obtain (And Keep) Cyber Insurance With Two Magic Words: Zero Trust

July 22, 2022
Cyber insurance has become fiendishly difficult and extremely expensive to secure and maintain. Businesses looking to obtain cyber insurance would be wise to adhere to the principles of Zero Trust Architecture (ZTA).
Read More
Man typing on laptop with login and lock showing privileged access management
Cyber SecurityInsights

Why Fortune 1000 Organizations Aren’t Thinking About Privileged Access Management the Right Way

May 24, 2022
With the current emphasis on Zero Trust, Fortune 1000 organizations should start looking beyond their Privileged Access Management (PAM) solutions to properly manage their privilege sprawl. The strategy is ‘Zero Standing Privilege,’ (ZSP).
Read More
User typing login and password showing identity security and zero trust
Cyber SecurityInsights

Identity Security: How the Weak Link Behind Major Breaches Could Have Been Avoided

April 12, 2022
When we look back at the headline-making attacks of 2021, it’s clear that many are rooted in one fundamental issue: compromised identities. Stepping back and implementing identity security basics can help organizations prevent future hacks.
Read More
Virtual lock and key in front of hands typing on the laptop keyboard
Cyber SecurityInsights

Three Keys to a Successful Zero-trust Implementation

March 21, 2022
The quick transition to the Zero-Trust model is mainly fueled by remote work, cloud adoption and an increase in deploying devices in recent years. Having the right security solutions to support a Zero-Trust strategy is critical. Here are three keys to implement a Zero-Trust approach successfully.
Read More
Close-up of a combination dial on an antique safe showing zero trust security
Cyber SecurityInsights

The Ocean’s Eleven Casino Vault Could Have Used Zero Trust Security

March 14, 2022
Bypassing of security during the successful heist of the Bellagio vault came down to identity and perimeter defenses, the main vulnerabilities of network security—and exactly the weaknesses that zero trust methodology fortifies for organizations.
Read More
Side view of woman working on laptop while sitting in cafe showing remote work and zero trust
Cyber SecurityInsights

Cybersecurity in a Remote Work World

November 4, 2021
How can an organization prevent unauthorized people from looking over their remote employee's shoulders? By utilizing an identity confirmation solution that combines biometrics, object recognition, and AI, businesses will ensure only approved employees view sensitive data.
Read More
Virtual shields over the globe showing use of SASE for Zero Trust
Cyber SecurityInsights

The SASE Revolution: When Network and Security Converge at Edge

May 26, 2021
To achieve the full promise of cloud and digital transformation, enterprises must transform not just their networking but also security architectures. SASE is moving organisations in this new direction.
Read More
Robots welding movement in a car production factory showing IoT security and zero trust
Cyber SecurityInsights

Zero Trust Manufacturing Approach Key to Balancing Complex Supply Chains and IoT Device Security

March 19, 2021
When implemented holistically, a zero-trust manufacturing architecture will ensure that a product’s firmware, data and digital credentials can be trusted through every step of the manufacturing supply chain.
Read More
Young business woman in medical mask working from home showing impact of remote working on identity management
Cyber SecurityInsights

Conditional Access – How To Support Remote Working and Identity Management

January 21, 2021
Remote work has put more pressure on the technology that companies have in place. What is important heading into 2021 is that we look at what went well, what has to change, and what lessons we can learn.
Read More
Finger pressing button on virtual screen showing cybersecurity trends
Cyber SecurityInsights

2021 Trends in Cybersecurity

January 19, 2021
Recent Russian hack that hit the Pentagon and multiple U.S. agencies should jolt enterprises from any lingering “breach fatigue” and jump-start efforts around cybersecurity.
Read More
Load More

Latest

Man looking at SMS on phone showing robotext scams and smishing attacks

FCC Warns About Increased Robotext Scams From Automated Smishing Attacks

Twitter logo on mobile phone screen showing Twitter API keys used for account hijacking

Thousands of Mobile Apps Are Leaking Twitter API Keys, Could Be Used for Account Hijacking

Doctor monitoring patient using medical devices showing internet of medical things

Internet of Medical Threats? Exploring Bluetooth Low Energy Vulnerabilities in Medical Devices

Hand holding credit card showing remote control compromise of payment terminals

Hackers Reportedly Exploited Wiseasy’s Remote Control Dashboards to Compromise 140,000 Payment Terminals Worldwide

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results