SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

Zero trust security news stories - Page 2

Story image
Zero trust
Securing the hybrid workforce
It's likely that organisations will need to find a way to work alongside COVID-19, which will probably involve a hybrid approach to work. 
Story image
Ransomware
How Microsoft security infrastructure can sink a business
Organisations that are heavily or entirely reliant on Microsoft infrastructure, services and applications can take several steps to shore up their security.
Story image
Phishing
Fatigued IT teams losing the war on phishing
"Enterprise IT pros must stay ahead not only of the attackers who are constantly crafting new attacks, but also of their own users."
Story image
Zero trust
Benefits of zero trust extend beyond network security - study
"A Zero Trust framework can have on aspects of the business that extend far beyond network security."
Story image
Zero trust
Solving the problem of privilege with zero trust security
BeyondTrust’s Universal Privilege Management model recognises that securing passwords is not enough — privileges must be secured across environments.
Story image
Zero trust
Legislation and liability for cyber-attacks won’t save you — zero trust architecture will
Organisations can't stop breaches, but they can prevent them from spreading and becoming catastrophic incidents by using zero trust security.
Story image
Hybrid workforce
The future of work is hybrid — is your security ready?
Supporting a hybrid workforce while moving the needle on digital transformation requires a technology platform that adapts to changing business requirements.
Story image
Cloud Security
How to focus cloud-centric organisations’ data protection
Organisations can embrace digital transformation with confidence by including these crucial considerations in data protection strategy planning and execution.
Story image
Cloud Security
Apple enterprise management company Jamf merges with security solution Wandera
Jamf has announced the acquisition of zero-trust cloud security and access company Wandera.
Story image
Cybersecurity
Trust no one: Recalibrating security to address insider threats
The high profile cases of Edward Snowden and Chelsea Manning also provide an enduring yet often overlooked lesson about insider attacks.
Story image
Trend Micro
Trend Micro looks to ease confusion and power zero trust security strategies
"Trend Micro is uniquely positioned to provide critical insight into identity and device health with its comprehensive XDR and visibility into email risk, which is foundational for building a successful zero trust strategy.”
Story image
Cybersecurity
Why zero trust must form a key pillar of any cybersecurity strategy
Zero trust streamlines that access while strengthening security protections. For this reason, it should form an essential pillar of any cybersecurity strategy.
Story image
Network Access Control / NAC
Six key characteristics of a modern ZTNA solution
Not all zero trust network access solutions are equal. Organisations should keep in mind these six key characteristics when evaluating ZTNA solutions.
Story image
Network Management
Fortinet: Zero Trust Network Access (ZTNA) for secure cores, edges and clouds
Fortinet explains how trust has to be proven over and over again in order to ensure that every network component adheres to your overall security policies.
Story image
Forrester Research
Forrester names Google Cloud a Leader in Unstructured Data Security Platforms
Forrester also rated Google Cloud the highest in the current offering category among the providers evaluated.
Story image
Palo Alto Networks
Palo Alto Networks introduces complete Zero Trust network security
 “We are making it significantly simpler for companies to adopt complete Zero Trust Network Security.”
Story image
Remote Working
Organisations turn to zero trust to support remote workforce - Citrix survey
“Employee experience is critical to delivering business innovation and growth, and security must support it.” 
Story image
Cloud
Zscaler advances zero trust security for the digital business
"Thanks to cloud and mobility, our infrastructure, applications and data are everywhere, and as a result of the growing work-from-home (WFH) phenomenon, users are now more scattered than ever."
Story image
Cybersecurity
Video: 10 Minute IT Jams - SonicWall manager dissects zero trust security
Today’s interviewee is SonicWall head of presales for APAC, Yuvraj Pradhan, who discusses various talking points surrounding zero trust security.
Story image
Cybersecurity
Six key characteristics of a modern secure web gateway
For organisations to continue to thrive in a distributed work environment, they must ensure that security is also modernised to support new realities appropriately.
Story image
SD-WAN
Why organisations should make adaptability their #1 security requirement
Adaptability is the key to providing a strong security posture for organisations that are still weighing up their future scenarios to secure a workforce that is largely distributed versus one that’s mainly in the office. 
Story image
FireMon
IT leaders prioritising automation, Zero Trust and API-based security investments
"The study shows that a cocktail of multiplying threats, the proliferation of hybrid and cloud architectures, blended with a pandemic-fuelled explosion in distributed and remote work has created a perfect storm for network security teams."
Story image
Secure access service edge / SASE
Crawl, walk and run with SASE adoption
For organisations that would prefer to pace themselves and take a slower, more systematic approach to SASE adoption, a strategy of ‘crawl, walk, run’ is recommended, writes Bitglass regional sales director for ANZ Wayne Neich.
Story image
Partners
McAfee brings on new partners in push for zero trust security
"Together with our SIA partners, we are strengthening security for the critical apps that enterprises rely on every day."