Palo Alto Networks and HCL Technologies Power Up Partnership to Boost Managed Security Services Offerings
Partners focus on helping clients become a Zero Trust Enterprise via Secure Access Service Edge, cloud, and threat detection and response.
Johnson Controls Boosts Smart Building Cyber Defenses Through Tempered Networks Acquisition
Johnson Controls, armed with Tempered Networks, gains zero trust “Airwall” security technology to bolster self-defense systems for buildings.
Gartner’s Top Cybersecurity Predictions for 2022-23: What MSSPs Need to Know
Gartner Security & Risk Management Summit outlines top cybersecurity trends spanning Zero Trust, privacy, ransomware attacks, hybrid workforce & more.
What Are the Top Zero Trust Strategies for 2022?
Zero trust represents “one of the most effective security practices” for today’s organizations, an Optiv Security report finds.
Zero Trust Security Model: Forrester, Illumio Research Offers Reality Check
Nearly 80% of firms plan to bolster zero trust security operations in 2022, Forrester & Illumio survey finds.
Zero Trust Security Model Meets Federal Agencies in New OMB Initiatives
MSSPs that specialize in zero trust security could gain a leg up with U.S. federal government agencies. Here’s why.
MFA and Zero Trust Adoption Prodded by Cybersecurity Events, Research Finds
What role will biometrics potentially play in multi-factor authentication (MFA), passwordless security & zero trust? BIO-key research offers clues.
Zero Trust Security: Progress Report and One Identity Research Findings
Zero Trust security strategies accelerate, but only 20% of stakeholders think their organizations fully comprehend Zero Trust, One Identity research finds.
IBM Security Partners With Zscaler, Tech Data for Zero Trust Options
IBM Security partners with Zscaler and Tech Data Cyber Range for zero trust initiatives, cloud security services & customer testing options.
NIST Explains Zero Trust Architecture: A Closer Look
NIST provides a Zero Trust Architecture overview. KuppingerCole provides further context on the Zero Trust discussion for security professionals.