trust

  • Blog

    Foreign AI model launches may have improved trust in US AI developers, says Mandiant CTO – as he warns Chinese cyber attacks are at an “unprecedented level”

    Concerns about enterprise AI deployments have faded due to greater understanding of the technology and negative examples in the international community, according to Mandiant CTO Charles Carmakal. In conversation with ITPro at Google Cloud Next 2025, Carmakal said attitudes among firms who may have been hesitant to adopt the technology are changing rapidly. This process of coming around to AI,…

    Read More »
  • Blog

    Zero trust gains momentum amid growing network visibility challenges

    Network visibility challenges and rising cyber threats are prompting a step change in security strategies, according to new research, with firms ramping up zero trust capabilities. Findings from AlgoSec’s 2025 State of Network Security report show seven-in-ten security teams report visibility issues, which is delaying threat detection and response. Respondents to a survey by the firm warned that a lack…

    Read More »
  • Blog

    Zero Trust Architecture Implementation Guide

    The rapid evolution of cyber threats and the increasing prevalence of remote work have forced organizations to rethink their approach to network security. Traditional network security models operate on the assumption that everything inside an organization’s perimeter is trusted. This philosophy is no longer sufficient. The growing sophistication of cyberattacks, coupled with the rise in remote work and cloud computing,…

    Read More »
  • Blog

    Microsegmentation in Zero Trust Explained

    As organizations increasingly adopt Zero Trust Architecture (ZTA) to enhance their cybersecurity frameworks, the need for fine-grained, highly effective access controls becomes more apparent. The Zero Trust model operates under the premise that no one, whether inside or outside the network, should be implicitly trusted. Every request for access, regardless of its source, must be verified before being granted. Microsegmentation…

    Read More »
  • Blog

    Zero Trust Compliance and & Best Tools for 2025

    Cyber threats are increasingly sophisticated and pervasive, and traditional security models that rely on perimeter-based defenses are no longer sufficient. The Zero Trust security model has emerged as a suitable framework to address these challenges. Zero Trust operates on the principle of “never trust, always verify,” ensuring that every access request is thoroughly vetted, regardless of its origin. This approach…

    Read More »
  • Blog

    Zero Trust for Remote Workers

    As the modern workforce becomes increasingly distributed, the challenge of securing remote workers and mobile users has become one of the most pressing concerns for businesses. Remote work has been a long-standing trend, but with the rise of cloud services, mobile devices, and global collaboration, organizations now face more complex security threats. Zero Trust Architecture (ZTA) has emerged in response…

    Read More »
  • Blog

    NGFW and Zero Trust Integration for Stronger Security

    Businesses are constantly seeking innovative ways to protect their digital assets from increasingly sophisticated threats. Two of the most prominent strategies in modern cybersecurity are next-generation firewalls (NGFWs) and the zero-trust security model. While NGFWs have been a cornerstone of network security for years, the Zero Trust model represents a paradigm shift in how organizations approach security, emphasizing the principle…

    Read More »
  • Blog

    Microsoft Trust Signing service abused to code-sign malware

    Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. Threat actors have long sought after code-signing certificates as they can be used to sign malware to appear like they are from a legitimate company. Signed malware also has the advantage of potentially bypassing security filters that would normally block unsigned executables, or at least treat…

    Read More »
  • Blog

    Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success

    With the number of IoT devices expected to skyrocket in the next four years, researchers have called on more robust cybersecurity protections to counter a wave of rising threats. In a new study by Juniper Research, the number of devices is set to hit 28 billion globally by 2028. However, amidst this sharp growth, the increasing complexity of IoT networks…

    Read More »
  • Blog

    Google’s latest genAI shift is a reminder to IT leaders — never trust vendor policy – Computerworld

    If they add a clause to every RFP that they will only work with model-makers that agree to not do X, Y, or Z, that will get a lot of attention. The contract would have to be realistic, though. It might say, for instance, “If the model-maker later chooses to accept payments for the above-described prohibited acts, they must reimburse…

    Read More »
Back to top button
close