Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud Applications: A Zero Trust Approach To Security For Healthcare

Accelerated adoption of the cloud has driven healthcare organizations to rely more heavily on cloud-based productivity suites and apps that enable both employees and patients to access data from anywhere. Compound this use of managed and unmanaged mobile devices in a world where the network perimeter is being eroded and you have a real challenge at hand. AGENDA: Zero Trust - How to apply a dynamic and contextual approach to applications and data access in the cloud.

Five worthy reads: Cybersecurity mesh-An extension of the Zero Trust Network

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week let’s zoom in on cybersecurity mesh, which brings a twist to the existing security architecture with a distributed approach.

Why retailers must adopt a Zero Trust approach during this holiday season

The pandemic accelerated a trend that was already gaining increased traction: the preference for shopping online. The last eighteen months have brought a surge to the eCommerce industry, with consumers of all ages learning how to order items online. Competition has never been fiercer for online retailers, which means it’s not just quality products and customer service that companies must focus on.

The Zero-Trust Journey in 5 Phases

For a concept that represents absence, zero trust is absolutely everywhere. Companies that have explored how to embark upon zero-trust projects encounter daunting challenges and lose sight of the outcomes a zero-trust approach intends to achieve. Effective zero-trust projects aim to replace implicit trust with explicit, continuously adaptive trust across users, devices, networks, applications, and data to increase confidence across the business.

Zero Trust? Don't Forget Your Mobile Fleet

Does your Zero Trust strategy include mobile devices? If not, it might have a zero chance of being successful. Hear how to deliver continuous authentication for mobile users connecting to corporate data. Speakers: Tomas Maldonado - CISO, NFL Ramy Houssaini - Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas

Lookout ZTNA - Intro to onboarding an application, securing access and protecting sensitive data.

In this Lookout ZTNA demo video, you will see how to onboard an application that is within your corporate network, how to secure access to the application using identity-driven policies and how to apply data protection policies to protect sensitive data.

No Integrity, No Trust. The Foundation of Zero Trust Architecture | Ep 26

In the episode, Tripwire's Maurice Uenuma, discusses the role of integrity when it comes to Zero Trust Architecture. With results from our latest research survey on the Executive Order and Zero Trust, he and Tim make the case that Zero Trust cannot be maintained without proper Integrity controls at its foundation.

Why Adopting Zero Trust Security Is Necessary For DevSecOps

There’s a shift in the world of DevOps. It is no longer enough to create applications and just launch them into the cloud. In a world where entire businesses can exist online, securing your digital assets is as important as creating them. This is where DevSecOps comes in. It is the natural progression of DevOps — with security being a focus as much as the process of creating and launching applications.