SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

Zero trust security news stories

Story image
Ivanti
Ivanti and Lookout bring zero trust security to hybrid work
Ivanti and Lookout have joined forces to help organisations accelerate cloud adoption and mature their zero trust security posture in the everywhere workplace.
Story image
SaaS
Absolute Software expands Secure Access product offering
Absolute Software is enhancing its Secure Access product portfolio, enabling minimised risk exposure and optimised user experiences in the hybrid working environment.
Story image
Zero trust security
Jamf announces integration with Google Cloud’s ZTA solution
Jamf has announced a new integration with BeyondCorp Enterprise, bringing macOS compliance to Apple administrators using Jamf and Google Cloud.
Story image
Ransomware
Sophos launches zero trust offering for advanced endpoint protection
Sophos has launched Sophos ZTNA, a zero trust network access (ZTNA) offering that fully integrates with Sophos Intercept X to provide advanced endpoint protection and zero trust network access with a single agent.
Story image
Zero trust
Zscaler extends Zero Trust Exchange Platform to deliver zero trust for workloads
"To properly secure cloud workloads, three critical areas - security, connectivity, and performance - need to be addressed."
Story image
Cybersecurity
Opening of new data centre heralds ambitious APAC expansion plans for Keeper Security
In the background of our Zoom call is a poster on the wall of Guccione's office. It reads, "Cybersecurity starts here."
Story image
ThycoticCentrify
Zero Trust means strong, frictionless PAM and other controls
Imagine an organisation’s information infrastructure as something like a bank’s safe deposit box service, with security guards on the door.
Story image
Data Protection
CrowdStrike acquires SecureCircle, extends zero trust endpoint solution
"CrowdStrike will be setting a new standard for endpoint-based data protection by connecting zero trust enforcement to the device, the user identity and, with this acquisition, the data users are accessing and using.”
Story image
Zero trust security
Appgate launches latest version of zero trust network access solution
The new version of Appgate SDP introduces capability and usability enhancements designed to help enterprises expand and accelerate strategic zero trust initiatives.
Story image
Cybersecurity
Zero trust in NZ, and its rise from fringe approach to industry standard
The guiding principle of a zero trust security model is that no-one in an organisation — from a new recruit to the CISO — is granted intrinsic trust to access the network.
Story image
Firewall
SonicWall 'returns choice' to customers by securing different network environments
SonicWall’s Bill Conner has declared that organisations should no longer change the way they operate just to secure their networks, devices and people.
Story image
Zero trust
APAC organisations prioritising Zero Trust Security more than other regions
"It is imperative that businesses continue to be vigilant in anticipating new threats that emerge in this new digital landscape."
Story image
Integration
Zscaler and CrowdStrike deepen zero trust integrations
Zscaler has expanded integrations with CrowdStrike, allowing Zscaler ZIA to leverage CrowdStrike Falcon ZTA (Zero Trust Assessment) device scores for access policy configuration.
Story image
Citrix Systems
Citrix launches cloud delivered, zero trust network access service
Citrix Secure Private Access leverages adaptive authentication and access policies in conjunction with security controls to provide contextual access to all apps and data employees need.
Story image
Akamai
Akamai acquires Guardicore to expand zero trust portfolio
"By adding Guardicore's leading micro-segmentation products to Akamai's comprehensive portfolio of zero trust solutions, we believe Akamai will be able to provide the most effective way to combat ransomware on the market today.”
Story image
Zero trust
Where should zero trust end?
With the push to zero trust, we have a rare opportunity to fix today’s pressing cybersecurity issues and build a better model of thinking about cybersecurity.
Story image
Ping Identity
Ping Identity acquires Singular Key, extends no-code functionality
"Singular Key’s no-code identity orchestration makes integrating identity and other enterprise apps simple, allowing customers to achieve better end user experiences in less time.”
Story image
Trend Micro
Trend Micro puts zero trust theory into practice with latest launch
“This new solution adds further telemetry and visibility of connections across the entire IT environment to truly inform SOC teams. This is true zero trust theory put into product form.”
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - Bitglass director on the evolution of remote working risks
In this interview, we talk to Bitglass senior director of marketing Jonathan Andresen, who is back for his fourth IT Jam.
Story image
Secure access service edge / SASE
What to know when considering zero trust digital transformation
The security landscape is constantly changing, but SASE can help organisations tackle countless security challenges.
Story image
Zero trust
A10 Networks expands security portfolio to bolster Zero Trust architectures
Zero Trust has become a major initiative for many organisations.
Story image
Zero trust
No more security tradeoffs for SMBs or the branch office
Palo Alto Networks' PA-400 Series Next-Generation Firewalls (NGFWs) allows small and medium-sized business to expand their zero trust network security to every branch.
Story image
Appgate
Appgate named leader in zero trust network access by Forrester Research
In the report The Forrester New Wave: Zero Trust Network Access, Q3 2021, the analysts write: "[Appgate] is the best fit for companies that need high security and a self-hosted option."
Story image
Phishing
The new normal of cybersecurity: Ransomware, phishing and zero trust
"When the COVID-19 pandemic struck, cyber criminals saw their opportunity, and they took it."