zero-trust adoption
Cameyo Adds Secure Cloud Tunneling Capability
Cameyo, an application virtualization platform provider, today added a tunneling capability that eliminates the need for virtual private networks (VPNs) to open ports in firewalls to enable remote users to access applications ...
When it Comes to SASE, Trust but Verify
The last 18 months raised important questions about what work looks like, where it happens and which applications count as truly “business-critical.” In some ways, though, the worldwide scramble to rethink enterprise ...
How SASE Enables Zero-Trust
On this episode of The View With Vizard, Mike Vizard talks with Kelly Ahuja, CEO of Versa Networks about their latest $84 million funding round and the ways SASE enables zero-trust. The ...
A New Remote Zero-Trust Platform is Needed
Enterprise digital transformations are being seriously impeded by ineffective, difficult-to-secure remote working environments. Remote DevOps teams, for example, are affected by the quality of the remote access experience. Organizational security is impacted ...
Zero-Trust is an Adjective Without a Noun
People love to talk about zero-trust right now, for a number of reasons. It has the word “zero” in there, which has some history in the information security world (e.g., zero-day vulnerabilities) ...
Zero-Trust at the Data Layer
Often, ideas are ahead of their time. In October 2017, IDC’s Simon Piff and Hugh Ujhazy published a paper positing that data was the new endpoint. There is good chance that, in ...
Menlo Security Poll Finds Resistance to Ransom Demands
A poll of 8,571 individuals conducted on Twitter by Menlo Security suggests business and IT leaders are becoming more inclined to accept financial losses rather than cave to ransomware demands. A full ...
Rethinking Networking to Derail Ransomware
Despite the best efforts of many organizations, ransomware attacks are still on the rise; perhaps indicating that those “best efforts” are just not good enough. Take, for example, the recent ransomware attack ...
Cloud Complexity Rattles Enterprise Security Efforts
More than 15 months after the pandemic-driven rush to remote work, enterprises are still paying the price for the faster-than-previously-planned migration to the cloud. According to the 2021 Thales Global Threat Report ...
Is Your ZTNA Vendor Really Zero-Trust?
A recent article defined ZTNA (zero-trust network access) and delivered recommendations on how to get the best results from ZTNA. The piece also touched on the importance of selecting a zero-trust vendor ...