Zero trust security model

Everything Blockchain Inc. Named Winner in 2024 Global Infosec Cyber Defense Magazine Awards

Retrieved on: 
水曜日, 5月 8, 2024

Everything Blockchain Inc. , (OTCMKTS: EBZT), a technology company that is blending blockchain, DBMS and Zero Trust to deliver disruptive new ways to store, manage, and protect data, today announced their one-of-a-kind solution, BuildDB was recognized as a winner of the “Database Security, Data Leakage- Protection/Extrusion Prevention” category in the 2024 Global Infosec Cyber Defense Magazine (CDM) Awards .

Key Points: 
  • Everything Blockchain Inc. , (OTCMKTS: EBZT), a technology company that is blending blockchain, DBMS and Zero Trust to deliver disruptive new ways to store, manage, and protect data, today announced their one-of-a-kind solution, BuildDB was recognized as a winner of the “Database Security, Data Leakage- Protection/Extrusion Prevention” category in the 2024 Global Infosec Cyber Defense Magazine (CDM) Awards .
  • Judged by an esteemed assembly of Certified Information Systems Security Professionals (CISSP), Founding Members of the U.S. Department of Homeland Security (FMDHS), Certified Ethical Hackers (CEH), and certified security professionals, the 2024 Global Infosec CDM Awards recognize innovative companies dedicated to the next generation of information security solutions.
  • “This recognition in the 2024 Global InfoSec CDM Awards serves as testimony to our pursuit of helping enterprises more effectively manage and protect their data.” said Toney Jennings, CEO of Everything Blockchain Inc. “Our technology goes beyond current market offerings, and winning this award demonstrates the hard work and dedication of our team.
  • To see a full list of winners from this year’s awards, please visit here .

Zscaler Joins Forces with Google to Offer Unparalleled Zero Trust Data and Threat Protection

Retrieved on: 
火曜日, 5月 7, 2024

This powerful combination brings the power of Zscaler Private Access™ (ZPA) enabling zero trust secure access to private applications to anyone across different locations and devices, with the advanced threat and data protection capabilities of Chrome Enterprise Premium .

Key Points: 
  • This powerful combination brings the power of Zscaler Private Access™ (ZPA) enabling zero trust secure access to private applications to anyone across different locations and devices, with the advanced threat and data protection capabilities of Chrome Enterprise Premium .
  • Adopting a zero trust architecture coupled with Google Chrome Enterprise Premium offers users the most secure enterprise browsing.
  • “Zscaler shares our vision for a zero trust model, and we are excited to work with them in delivering browser-based threat and data protection through Chrome Enterprise Premium.
  • Distributed across more than 150 data centers globally, the Zero Trust Exchange™ platform is the world’s largest in-line cloud security platform.

VPN Risk Report Finds More Than Half of Organizations Experienced a VPN-related Cyberattack in the Last Year

Retrieved on: 
火曜日, 5月 7, 2024

It found that 56% of organizations have been targets of cyberattacks exploiting VPN security vulnerabilities in the last year.

Key Points: 
  • It found that 56% of organizations have been targets of cyberattacks exploiting VPN security vulnerabilities in the last year.
  • These incidents underscore the growing imperative to move away from traditional perimeter-based defenses towards a more robust Zero Trust architecture.
  • Notably, the report revealed that 78% of surveyed organizations plan to actively implement Zero Trust strategies within the next 12 months.
  • To help minimize the blast radius and mitigate risk from VPN vulnerabilities, Zscaler strongly urges the adoption of a Zero Trust architecture.

Jamf named winner in three categories of the Global InfoSec Awards during RSA 2024

Retrieved on: 
月曜日, 5月 6, 2024

End user privacy is preserved and policy controls are applied only to work applications, making the solution ideal for BYOD.

Key Points: 
  • End user privacy is preserved and policy controls are applied only to work applications, making the solution ideal for BYOD.
  • “A successful bring-your-own-device program relies on balancing privacy and security without sacrificing device usability or violating trust,” said Jamf CIO Linh Lam.
  • Jamf is absolutely worthy of these coveted awards and consideration for deployment in your environment,” said Yan Ross, Global Editor of Cyber Defense Magazine.
  • Jamf will be on-site this week at RSA Conference 2024 in San Francisco, CA.

Cyolo Partners with Dragos to Unveil Holistic Secure Remote Access Solution for Critical Infrastructure

Retrieved on: 
水曜日, 5月 8, 2024

Cyolo , the secure remote access company for operational technology (OT) and industrial control systems (ICS), today announced a strategic partnership with Dragos, a global leader in cybersecurity for ICS/OT.

Key Points: 
  • Cyolo , the secure remote access company for operational technology (OT) and industrial control systems (ICS), today announced a strategic partnership with Dragos, a global leader in cybersecurity for ICS/OT.
  • Under the umbrella of Cyolo’s CyoloVerse partner program, Cyolo's PRO Secure Remote Access Platform will work with Dragos’s industry-leading OT cybersecurity platform.
  • This collaboration will provide organizations with a robust and interoperable solution to protect their critical infrastructure against cyber threats.
  • “Cyolo ICS/OT security and safety expertise are changing the way organizations understand secure remote access,” said Matt Cowell, VP of Business Development at Dragos.

Riverbed Unveils Most Advanced AI-Powered Platform to Optimize Digital Experiences, and New Solutions for Mobile, Cloud, AIOps

Retrieved on: 
火曜日, 5月 7, 2024

Riverbed, the leader in AI Observability, introduced the most advanced AI-powered observability platform to optimize digital experiences , and launched several new solutions and a unified agent built on this open architecture.

Key Points: 
  • Riverbed, the leader in AI Observability, introduced the most advanced AI-powered observability platform to optimize digital experiences , and launched several new solutions and a unified agent built on this open architecture.
  • View the full release here: https://www.businesswire.com/news/home/20240507694960/en/
    Riverbed's new AI-powered observability platform optimizes digital experiences to improve IT efficiency.
  • LinkedIn: Riverbed unveils the most advanced AI-powered platform to optimize digital experiences, and new solutions for mobile, cloud, and AIOps: https://rvbd.ly/3wvmuCa
    “Customers are challenged with improving the digital experience, simplifying their management environment and implementing AI that works and scales,” said Dave Donatelli, Chief Executive Officer at Riverbed.
  • The Riverbed Platform includes a number of underlying technologies including:​
    The new Riverbed Unified Agent, which streamlines the deployment and management of visibility solutions with a single agent.

AppOmni Releases Zero Trust Posture Management, Enhancing SaaS Security by Extending Zero Trust to the Application Layer

Retrieved on: 
火曜日, 5月 7, 2024

RSA Conference-- AppOmni , the pioneer of SaaS security posture management (SSPM), today formally announced AppOmni Zero Trust Posture Management (ZTPM), a unique solution set that dramatically strengthens security in modern infrastructures by bridging a critical gap in network-centric Zero Trust (ZT) architectures.

Key Points: 
  • RSA Conference-- AppOmni , the pioneer of SaaS security posture management (SSPM), today formally announced AppOmni Zero Trust Posture Management (ZTPM), a unique solution set that dramatically strengthens security in modern infrastructures by bridging a critical gap in network-centric Zero Trust (ZT) architectures.
  • Specifically, the framework provides an unprecedented level of visibility and monitoring into the configuration, security posture, and user behaviors within Software-as-a-Service (SaaS) applications.
  • Through these and continuous authorization capabilities, AppOmni extends Zero Trust architectures to SaaS applications and data with ZTPM through the company’s signature SSPM platform.
  • AppOmni goes further than ever in delivering on the potential of Zero Trust in sprawling SaaS deployments.

Cloud Security Alliance Paper Addresses Challenges of Implementing Zero Trust in Environments Where Artificial Intelligence (AI)-induced Shadow Access Is Prevalent

Retrieved on: 
火曜日, 5月 7, 2024

Authored by CSA’s Identity and Access Management Working Group , the paper examines the intersection of Shadow Access with two of today’s most top-of-mind technologies – Zero Trust and Artificial Intelligence – and underscores the necessity of adapting traditional Zero Trust approaches to the nuances of Generative AI (GenAI) technology to mitigate AI-induced Shadow Access vulnerabilities and strengthen cybersecurity in an evolving landscape.

Key Points: 
  • Authored by CSA’s Identity and Access Management Working Group , the paper examines the intersection of Shadow Access with two of today’s most top-of-mind technologies – Zero Trust and Artificial Intelligence – and underscores the necessity of adapting traditional Zero Trust approaches to the nuances of Generative AI (GenAI) technology to mitigate AI-induced Shadow Access vulnerabilities and strengthen cybersecurity in an evolving landscape.
  • Whereas a growing number of organizations are embracing the principles of Zero Trust, with its philosophy of "Never Trust, Always Verify," they are simultaneously encountering significant challenges in fully implementing it in cloud-native architectures where Shadow Access is prevalent.
  • Therefore, it’s critically important that, as enterprises continue on their cloud security journey, they understand how Shadow Access and Zero Trust are intertwined and how the advent of GenAI and its accompanying tools has exacerbated the problem of Shadow Access," said Ryan Gifford, Research Analyst, Cloud Security Alliance.
  • “As more companies embrace GenAI, the Working Group felt it was important to shed light on the challenges Shadow Access poses to Zero Trust and provide a path to Zero Trust’s successful implementation.”
    The paper offers key takeaways such as:
    An overview of Shadow Access, Zero Trust, GenAI, and Large Language Models

Cyber Defense Magazine Names Cloud Security Alliance’s Certificate of Competence in Zero Trust (CCZT) a 2024 Global InfoSec Award Winner for Cutting-Edge Cybersecurity Training

Retrieved on: 
月曜日, 5月 6, 2024

(RSA Conference)--The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is pleased to announce that Cyber Defense Magazine has named its Certificate of Competence in Zero Trust (CCZT) as a Global InfoSec Award winner with the title of Cutting-Edge Cybersecurity Training.

Key Points: 
  • (RSA Conference)--The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is pleased to announce that Cyber Defense Magazine has named its Certificate of Competence in Zero Trust (CCZT) as a Global InfoSec Award winner with the title of Cutting-Edge Cybersecurity Training.
  • Based on the key concepts outlined in CSA's Zero Trust Training (ZTT) , the CCZT provides an in-depth understanding of Zero Trust architecture, its components, and its functioning.
  • “With Zero Trust established as the future of information security, a Zero Trust-based approach is fast becoming a requirement for organizations and a required skill for a range of security professionals.
  • Now in its 12th year, the Cyber Defense Global InfoSec awards honor startups, early stage, later stage, or public companies in the information security space who offer a forward-looking cybersecurity product or service.

Exploring the Surge in Digital Infrastructure Spending Driven by Generative AI Innovations

Retrieved on: 
火曜日, 5月 7, 2024

VANCOUVER, BC, May 7, 2024 /PRNewswire/ -- USA News Group – The rise of generative AI is currently adding considerable potential for accelerating economic growth across a wide array of sectors. In order to fully realize this potential, analysts at ING are highlighting how crucial investment in data and digital infrastructure will be moving forward. Citing estimates from Dell'Oro and Bank of America, ING has pointed out that investments from big tech companies in digital infrastructure is expected to grow between 15-22% this year alone. Another report from analysts at SNS Insider are projecting the AI Infrastructure Market to hit US$222.42 billion by 2030, growing at an explosive CAGR of 25.5%. Behind the scenes, developments in AI infrastructure are being made and provided by a variety of tech companies that include Avant Technologies Inc. (OTCQB: AVAI), Vertiv Holdings Co (NYSE: VRT), Equinix, Inc. (NASDAQ: EQIX), Innodata Inc. (NASDAQ: INOD), and Salesforce, Inc. (NYSE: CRM).

Key Points: 
  • In order to fully realize this potential, analysts at ING are highlighting how crucial investment in data and digital infrastructure will be moving forward.
  • Another report from analysts at SNS Insider are projecting the AI Infrastructure Market to hit US$222.42 billion by 2030, growing at an explosive CAGR of 25.5%.
  • "By providing robust computational resources and a rich dataset, Avant is set to eliminate many of the technical and financial barriers that have traditionally hampered AI development.
  • "In today's digital landscape, companies struggle with islands of data spread across various systems," said Brian Millham, President and Chief Operating Officer at Salesforce.