Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2021

Using Zero Trust to Mitigate Supply Chain Risks

Software supply chain attacks have been on the rise lately. With the current pervasiveness of third-party and open source libraries, which presumably developers cannot control as strongly as the code they create, vulnerabilities in these software dependencies are causing serious security risks to applications. Supply chain attacks abuse the inherent trust that users have with a software provider.

Forward Fix Live: Extending Zero Trust in the Cloud

Trying to make sense of your cloud security posture shouldn't mean flipping between multiple screens and inferring how traffic is behaving. Join this live event to see how you can monitor and verify your security posture across multiple clouds on a single screen.

Netskope Selected to Participate in ATARC Zero Trust Lab

We are pleased to share that Netskope has been selected by the Advanced Technology Academic Research Center (ATARC) as one of 49 vendors to participate in its Zero Trust Lab. The Zero Trust Lab is a state-of-the-art physical and virtual test environment that will provide federal agencies with the opportunity to build, test, and evaluate new Zero Trust Architectures in a simulated environment.

Splunk and DTEX Systems Leverage Human Telemetry and Zero Trust to Mitigate Insider Risks and Account Compromise

What was once the thing of spy movies and industrial espionage news headlines is now, sadly, a common occurrence for public organizations and private enterprises around the globe. Insiders… employees, consultants, partners… have emerged as one of the most immediate and serious threats facing IT and cyber security teams and practitioners today. It is not however because every insider has turned malicious.

What is Zero Trust?

Zero Trust is a security model — a strategy for protecting an organization’s IT assets, including data, services and applications. The Zero Trust model is built upon research more than a decade ago by analysts at Forrester, and it is now recommended by many security experts and vendors, including Microsoft. Zero Trust is a security architecture model that requires no implicit trust to be given in any quarter.

Lookout is Collaborating With the U.S. Government on a New Vision for Zero Trust

In early 2020, almost every government agency embraced telework in response to the pandemic. With telework, employees operate outside the security perimeter that was put in place to protect them and the agency’s data. As a result, telework has had significant cybersecurity ramifications. Lookout has a long history of collaborating with the public sector to secure agency employees.

Zero Trust by Executive Order | Best Practices For Zero Trust Security You Can Takeaway From Biden's Executive Order

Cyber attacks, like the pandemic that has spurred the rise in incidents, have been relentless. Over the past eight months, there has been a significant escalation as the sophistication of these attacks has risen. Hackers are going after key vendors, allowing them to target wide swaths of valuable victims like we have seen in the attacks on SolarWinds, Microsoft Exchange, Colonial Pipeline, and more recently, MSP software provider Kaseya.

Straight Talk Series: Network and Security United

A Secure Access Service Edge (or SASE) solution requires both network and security teams, and their tools to work together harmoniously. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

8 Benefits of Implementing a Zero Trust Architecture

Offers threat protection against both internal and external threats– External threats or hackers act from outside the organization and have to overcome the external security defense system to have access to the organization’s data. Malware, Phishing, DDoS attacks, ransomware, Trojan, worm, etc. are some of the methods used by hackers to gain entry into the organization’s corporate network. Unlike external threats, internal ones are usually hard to detect.

Infinipoint and Netskope Partner to Integrate Device Identity with Zero Trust Access

In the past year, IT services have gone through a world of change. There are more remote workers, hybrid work models, cloud services, and mobile devices. It is finally safe to say that the classic perimeter no longer exists. In fact, you might go one step further and say that identity is the new perimeter. The ability for end-users to access any applications from any device from anywhere has put securing identities and their access privileges near the top of any Zero Trust security strategy.

How to build a Zero Trust strategy for your business

Today, corporate and business networks have drastically evolved — our data spans multiple locations, cloud vendors, and a growing number of endpoints. Traditional security, once reliant on protecting organizations from the perimeter and trusting devices inside the network, has become less effective. Adding to the complexity, the work from home (WFH) model is being embraced by many organizations as they adapt to a rapidly shifting business climate.

Deploying Zero-Trust Networks in the Era of COVID-19

The coronavirus pandemic has exposed business continuity inadequacies at many organizations, and highlighted the slow pace of progress in digital transformation. This new reality necessitates a departure from a traditional network-centric security model that assumes every device and user within the network should be trusted. In this eBook we will explore how the dynamics of COVID-19 have impacted security, outline the importance of a zero-trust approach, and discuss how WatchGuard can help your business deliver the security you need during these trying times.