Essential steps for zero-trust strategy implementation

63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing a zero-trust strategy, this investment represents less than 25% of the overall cybersecurity budget. A… Continue reading Essential steps for zero-trust strategy implementation

Difference between Spire node attestation with VM instance identities and Kubernetes projected service account tokens

We deploy Spire to self-managed Kubernetes clusters on hyperscaler VMs (i.e. AWS EC2, Azure VMs, GCP Compute Engine)
Technically speaking, we could set up node attestation either based on VM instance identities (i.e. aws_iid, azure_msi, gc… Continue reading Difference between Spire node attestation with VM instance identities and Kubernetes projected service account tokens

Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks

Zscaler announces plans to acquire Airgap Networks, a venture-backed startup selling network segmentation and secure access technologies.
The post Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks appeared first on SecurityWeek.
Continue reading Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks

Industrial sectors embrace zero trust for enhanced security

Organizations are leveraging zero trust to enhance the safety, security, and reliability of their enterprise across IT and OT environments, according to Xage Security. Zero trust security implementation in industrial sectors The report analyzes the cur… Continue reading Industrial sectors embrace zero trust for enhanced security

Strengthening critical infrastructure cybersecurity is a balancing act

In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure cybersecurity strategies, barriers to threat information sharing, and innovative technologies enhancing resilience against … Continue reading Strengthening critical infrastructure cybersecurity is a balancing act

8 cybersecurity predictions shaping the future of cyber defense

Among Gartner’s top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of generative AI (GenAI). Two-thirds of global 100 organizations are expected to ex… Continue reading 8 cybersecurity predictions shaping the future of cyber defense

How CISOs navigate policies and access across enterprises

In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and access controls in a distributed enterprise. He also highlights the significance … Continue reading How CISOs navigate policies and access across enterprises

Zero trust implementation: Plan, then execute, one step at a time

82% of cybersecurity professionals have been working on implementing zero trust last year, and 16% should be on it by the end of this year. The challenges of zero trust implementation You’ve probably heard it before: zero trust is not a single pr… Continue reading Zero trust implementation: Plan, then execute, one step at a time