trust
-
Blog
Microsoft ramps up zero trust capabilities amid agentic AI push
AI agents need to be treated like any other employee, at least when it comes to security, and that means they can’t be trusted by default and need their own secure identification. With zero trust in mind, Microsoft will be extending its security and identity tools — Entra, Purview, and Defender — to cover AI agents developed using its own…
Read More » -
Blog
Building trust through expert content
It’s an understatement to say that the UK’s national health system was exposed for its inadequacy during the COVID-19 pandemic. A decade-long policy of government budget cuts left it ill-equipped to supply enough beds for patients, staff and medical equipment for hospitals, and investment in research to offer guidance on long COVID – as well as showing flagrant inequality in…
Read More » -
Blog
“Public trust has become the new currency for AI innovation”: Why SAS is ringing the alarm bell on AI governance for enterprises
Leaders looking to implement AI should make AI governance and risk management their primary focus if they are to succeed in their adoption plans, according to a SAS executive. Reggie Townsend, VP, Data Ethics at SAS, told assembled media at SAS Innovate 2025 that tech leaders need to consider the risks AI brings now, whether they’re ready for it or…
Read More » -
Blog
Foreign AI model launches may have improved trust in US AI developers, says Mandiant CTO – as he warns Chinese cyber attacks are at an “unprecedented level”
Concerns about enterprise AI deployments have faded due to greater understanding of the technology and negative examples in the international community, according to Mandiant CTO Charles Carmakal. In conversation with ITPro at Google Cloud Next 2025, Carmakal said attitudes among firms who may have been hesitant to adopt the technology are changing rapidly. This process of coming around to AI,…
Read More » -
Blog
Zero trust gains momentum amid growing network visibility challenges
Network visibility challenges and rising cyber threats are prompting a step change in security strategies, according to new research, with firms ramping up zero trust capabilities. Findings from AlgoSec’s 2025 State of Network Security report show seven-in-ten security teams report visibility issues, which is delaying threat detection and response. Respondents to a survey by the firm warned that a lack…
Read More » -
Blog
Zero Trust Architecture Implementation Guide
The rapid evolution of cyber threats and the increasing prevalence of remote work have forced organizations to rethink their approach to network security. Traditional network security models operate on the assumption that everything inside an organization’s perimeter is trusted. This philosophy is no longer sufficient. The growing sophistication of cyberattacks, coupled with the rise in remote work and cloud computing,…
Read More » -
Blog
Microsegmentation in Zero Trust Explained
As organizations increasingly adopt Zero Trust Architecture (ZTA) to enhance their cybersecurity frameworks, the need for fine-grained, highly effective access controls becomes more apparent. The Zero Trust model operates under the premise that no one, whether inside or outside the network, should be implicitly trusted. Every request for access, regardless of its source, must be verified before being granted. Microsegmentation…
Read More » -
Blog
Zero Trust Compliance and & Best Tools for 2025
Cyber threats are increasingly sophisticated and pervasive, and traditional security models that rely on perimeter-based defenses are no longer sufficient. The Zero Trust security model has emerged as a suitable framework to address these challenges. Zero Trust operates on the principle of “never trust, always verify,” ensuring that every access request is thoroughly vetted, regardless of its origin. This approach…
Read More » -
Blog
Zero Trust for Remote Workers
As the modern workforce becomes increasingly distributed, the challenge of securing remote workers and mobile users has become one of the most pressing concerns for businesses. Remote work has been a long-standing trend, but with the rise of cloud services, mobile devices, and global collaboration, organizations now face more complex security threats. Zero Trust Architecture (ZTA) has emerged in response…
Read More » -
Blog
NGFW and Zero Trust Integration for Stronger Security
Businesses are constantly seeking innovative ways to protect their digital assets from increasingly sophisticated threats. Two of the most prominent strategies in modern cybersecurity are next-generation firewalls (NGFWs) and the zero-trust security model. While NGFWs have been a cornerstone of network security for years, the Zero Trust model represents a paradigm shift in how organizations approach security, emphasizing the principle…
Read More »